{"id":"https://openalex.org/W2536058570","doi":"https://doi.org/10.1145/2976749.2978331","title":"High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority","display_name":"High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2536058570","doi":"https://doi.org/10.1145/2976749.2978331","mag":"2536058570"},"language":"en","primary_location":{"id":"doi:10.1145/2976749.2978331","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088270518","display_name":"Toshinori Araki","orcid":null},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Toshinori Araki","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102346243","display_name":"Jun Furukawa","orcid":null},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Jun Furukawa","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033036383","display_name":"Yehuda Lindell","orcid":"https://orcid.org/0000-0002-8176-690X"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yehuda Lindell","raw_affiliation_strings":["Bar-Ilan University, Ramat Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031866855","display_name":"Ariel Nof","orcid":"https://orcid.org/0009-0007-4852-083X"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Ariel Nof","raw_affiliation_strings":["Bar-Ilan University, Ramat Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050195240","display_name":"Kazuma Ohara","orcid":"https://orcid.org/0000-0003-0213-3942"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuma Ohara","raw_affiliation_strings":["NEC Corporation, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC Corporation, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5088270518"],"corresponding_institution_ids":["https://openalex.org/I118347220"],"apc_list":null,"apc_paid":null,"fwci":37.5463,"has_fulltext":false,"cited_by_count":384,"citation_normalized_percentile":{"value":0.99730819,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"805","last_page":"817"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/kerberos","display_name":"Kerberos","score":0.8568012118339539},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8222131729125977},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5517980456352234},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5484259724617004},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.526516318321228},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5094502568244934},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5093296766281128},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.47631391882896423},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.4681829512119293},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4440048635005951},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.43734729290008545},{"id":"https://openalex.org/keywords/handshake","display_name":"Handshake","score":0.4217148423194885},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4037608504295349}],"concepts":[{"id":"https://openalex.org/C32455479","wikidata":"https://www.wikidata.org/wiki/Q506053","display_name":"Kerberos","level":3,"score":0.8568012118339539},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8222131729125977},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5517980456352234},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5484259724617004},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.526516318321228},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5094502568244934},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5093296766281128},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.47631391882896423},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.4681829512119293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4440048635005951},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.43734729290008545},{"id":"https://openalex.org/C2778000800","wikidata":"https://www.wikidata.org/wiki/Q830043","display_name":"Handshake","level":3,"score":0.4217148423194885},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4037608504295349},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2976749.2978331","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2976749.2978331","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W181949725","https://openalex.org/W1245637661","https://openalex.org/W1485800369","https://openalex.org/W1489706603","https://openalex.org/W1499934958","https://openalex.org/W1500761685","https://openalex.org/W1965492831","https://openalex.org/W1977802313","https://openalex.org/W1997859100","https://openalex.org/W2003668524","https://openalex.org/W2006453614","https://openalex.org/W2013623332","https://openalex.org/W2027471022","https://openalex.org/W2039605106","https://openalex.org/W2057811891","https://openalex.org/W2080911030","https://openalex.org/W2088492763","https://openalex.org/W2141420453","https://openalex.org/W2149804187","https://openalex.org/W2155783532","https://openalex.org/W2233233025","https://openalex.org/W2275295769","https://openalex.org/W2293620193","https://openalex.org/W2512093144","https://openalex.org/W2949933192","https://openalex.org/W2998818221","https://openalex.org/W6694664753"],"related_works":["https://openalex.org/W2083701517","https://openalex.org/W2082804893","https://openalex.org/W2382527959","https://openalex.org/W87038205","https://openalex.org/W2539281752","https://openalex.org/W2550686250","https://openalex.org/W2069340834","https://openalex.org/W2166322483","https://openalex.org/W2125679084","https://openalex.org/W3152465837"],"abstract_inverted_index":{"In":[0,108],"this":[1],"paper,":[2],"we":[3,110],"describe":[4],"a":[5,10,36,75,82,112,155],"new":[6],"information-theoretic":[7],"protocol":[8,22,51,89],"(and":[9,43],"computationally-secure":[11],"variant)":[12],"for":[13,29,39,47,167],"secure":[14,54,176],"three-party":[15],"computation":[16,26,177],"with":[17,81,128],"an":[18],"honest":[19],"majority.":[20],"The":[21],"has":[23],"very":[24,168],"minimal":[25],"and":[27,61],"communication;":[28],"Boolean":[30],"circuits,":[31],"each":[32],"party":[33],"sends":[34],"only":[35],"single":[37],"bit":[38],"every":[40],"AND":[41],"gate":[42],"nothing":[44],"is":[45,52,151,178],"sent":[46],"XOR":[48],"gates).":[49],"Our":[50,149,171],"(simulation-based)":[53],"in":[55,64,68,126],"the":[56,65,69,85,117,121,138,142],"presence":[57,70],"of":[58,71,77,87,144,158],"semi-honest":[59],"adversaries,":[60],"achieves":[62],"privacy":[63],"client/server":[66],"model":[67],"malicious":[72],"adversaries.":[73],"On":[74],"cluster":[76],"three":[78],"20-core":[79],"servers":[80],"10Gbps":[83],"connection,":[84],"implementation":[86,150],"our":[88,129],"carries":[90],"out":[91],"over":[92,102,159],"1.3":[93],"million":[94],"AES":[95],"computations":[96],"per":[97,106,162],"second,":[98,163],"which":[99,164],"involves":[100],"processing":[101],"7":[103],"billion":[104],"gates":[105],"second.":[107],"addition,":[109],"developed":[111],"Kerberos":[113,145],"extension":[114],"that":[115,134,174],"replaces":[116],"ticket-granting-ticket":[118],"encryption":[119],"on":[120,180],"Key":[122],"Distribution":[123],"Center":[124],"(KDC)":[125],"MIT-Kerberos":[127],"protocol,":[130],"using":[131],"keys/":[132],"passwords":[133],"are":[135],"shared":[136],"between":[137],"servers.":[139],"This":[140],"enables":[141],"use":[143],"while":[146],"protecting":[147],"passwords.":[148],"able":[152],"to":[153],"support":[154],"login":[156],"storm":[157],"35,000":[160],"logins":[161],"suffices":[165],"even":[166],"large":[169],"organizations.":[170],"work":[172],"demonstrates":[173],"high-throughput":[175],"possible":[179],"standard":[181],"hardware.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":57},{"year":2024,"cited_by_count":45},{"year":2023,"cited_by_count":57},{"year":2022,"cited_by_count":45},{"year":2021,"cited_by_count":50},{"year":2020,"cited_by_count":40},{"year":2019,"cited_by_count":38},{"year":2018,"cited_by_count":35},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
