{"id":"https://openalex.org/W2892164098","doi":"https://doi.org/10.1145/3243734.3243854","title":"Generalizing the SPDZ Compiler For Other Protocols","display_name":"Generalizing the SPDZ Compiler For Other Protocols","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2892164098","doi":"https://doi.org/10.1145/3243734.3243854","mag":"2892164098"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243854","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243854","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088270518","display_name":"Toshinori Araki","orcid":null},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Toshinori Araki","raw_affiliation_strings":["NEC, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025656030","display_name":"Assi Barak","orcid":null},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Assi Barak","raw_affiliation_strings":["Bar-Ilan University, Ramat Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102346243","display_name":"Jun Furukawa","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jun Furukawa","raw_affiliation_strings":["NEC Israel Research Center, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"NEC Israel Research Center, Tel Aviv, Israel","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010795922","display_name":"Marcel Keller","orcid":"https://orcid.org/0000-0003-2261-9376"},"institutions":[{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Marcel Keller","raw_affiliation_strings":["Data61, Sydney, Australia"],"affiliations":[{"raw_affiliation_string":"Data61, Sydney, Australia","institution_ids":["https://openalex.org/I42894916"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033036383","display_name":"Yehuda Lindell","orcid":"https://orcid.org/0000-0002-8176-690X"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yehuda Lindell","raw_affiliation_strings":["Bar-Ilan University, Ramat Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050195240","display_name":"Kazuma Ohara","orcid":"https://orcid.org/0000-0003-0213-3942"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Kazuma Ohara","raw_affiliation_strings":["NEC, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013263916","display_name":"Hikaru Tsuchida","orcid":"https://orcid.org/0000-0002-8589-4861"},"institutions":[{"id":"https://openalex.org/I118347220","display_name":"NEC (Japan)","ror":"https://ror.org/04jndar25","country_code":"JP","type":"company","lineage":["https://openalex.org/I118347220"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hikaru Tsuchida","raw_affiliation_strings":["NEC, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"NEC, Tokyo, Japan","institution_ids":["https://openalex.org/I118347220"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5088270518"],"corresponding_institution_ids":["https://openalex.org/I118347220"],"apc_list":null,"apc_paid":null,"fwci":3.7463,"has_fulltext":false,"cited_by_count":45,"citation_normalized_percentile":{"value":0.94588463,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"880","last_page":"895"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9740999937057495,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8759837746620178},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.8033231496810913},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7802356481552124},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.531803548336029},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5205981731414795},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4700283706188202},{"id":"https://openalex.org/keywords/boolean-circuit","display_name":"Boolean circuit","score":0.4472157955169678},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.430355429649353},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4284302592277527},{"id":"https://openalex.org/keywords/optimizing-compiler","display_name":"Optimizing compiler","score":0.4227515459060669},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.4110196828842163},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.362423837184906},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19482293725013733}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8759837746620178},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.8033231496810913},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7802356481552124},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.531803548336029},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5205981731414795},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4700283706188202},{"id":"https://openalex.org/C141796577","wikidata":"https://www.wikidata.org/wiki/Q837479","display_name":"Boolean circuit","level":3,"score":0.4472157955169678},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.430355429649353},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4284302592277527},{"id":"https://openalex.org/C190902152","wikidata":"https://www.wikidata.org/wiki/Q1325106","display_name":"Optimizing compiler","level":3,"score":0.4227515459060669},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.4110196828842163},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.362423837184906},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19482293725013733},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3243854","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243854","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7485788850","display_name":null,"funder_award_id":"615172","funder_id":"https://openalex.org/F4320338335","funder_display_name":"H2020 European Research Council"}],"funders":[{"id":"https://openalex.org/F4320338335","display_name":"H2020 European Research Council","ror":"https://ror.org/0472cxd90"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W181837502","https://openalex.org/W1181448101","https://openalex.org/W1488113673","https://openalex.org/W1493343761","https://openalex.org/W1508764330","https://openalex.org/W1516531644","https://openalex.org/W1524288918","https://openalex.org/W1635361314","https://openalex.org/W1888364621","https://openalex.org/W2004814164","https://openalex.org/W2039605106","https://openalex.org/W2130901615","https://openalex.org/W2160502124","https://openalex.org/W2182003716","https://openalex.org/W2402235285","https://openalex.org/W2520099014","https://openalex.org/W2536058570","https://openalex.org/W2539273492","https://openalex.org/W2604366484","https://openalex.org/W2704367133","https://openalex.org/W2765632506","https://openalex.org/W2767024440","https://openalex.org/W2770710659","https://openalex.org/W2794444540","https://openalex.org/W2794685135","https://openalex.org/W2950849082","https://openalex.org/W3029527999","https://openalex.org/W3031847131","https://openalex.org/W6712193006"],"related_works":["https://openalex.org/W2002505081","https://openalex.org/W2083681681","https://openalex.org/W2577630842","https://openalex.org/W1172579163","https://openalex.org/W1488300410","https://openalex.org/W2138790427","https://openalex.org/W4246454774","https://openalex.org/W2162051035","https://openalex.org/W1597127505","https://openalex.org/W3146558274"],"abstract_inverted_index":{"Protocols":[0],"for":[1,79,217,246,291,299,317,334,349,435],"secure":[2],"multiparty":[3,346],"computation":[4,108],"(MPC)":[5],"enable":[6,286],"a":[7,119,137,189,322,329,356,380,484,489],"set":[8],"of":[9,18,32,54,60,127,177,251,289,312,327,341,366,447,454],"mutually":[10],"distrusting":[11],"parties":[12],"to":[13,75,122,130,135,145,149,167,179,199,285,295,301,387,390,406,416,461],"compute":[14],"an":[15,153,213,314],"arbitrary":[16,292],"function":[17,45,144],"their":[19],"inputs":[20],"while":[21],"preserving":[22],"basic":[23],"security":[24],"properties":[25],"like":[26],"privacy":[27],"and":[28,66,92,109,125,159,192,211,229,232,257,294,304,344,394,408,425,432,450,467,488],"correctness.":[29],"The":[30,222],"study":[31],"MPC":[33,72,128,139,214,384],"was":[34,41],"initiated":[35],"in":[36,64,81,95,185,283],"the":[37,52,107,110,123,131,143,195,203,239,247,266,287,339,345,373,397,436,452],"1980s":[38],"where":[39],"it":[40,67,271,297],"shown":[42],"that":[43,71,87,206,220,270,355],"any":[44,325],"can":[46,88,100,225,272,361],"be":[47,102,146,150,200,244,362,388],"securely":[48,218],"computed,":[49],"thus":[50,469],"demonstrating":[51],"power":[53],"this":[55,113,160,186,193,262],"notion.":[56],"However,":[57,236,410],"these":[58,367,411],"proofs":[59],"feasibility":[61],"were":[62,281],"theoretical":[63],"nature":[65],"is":[68,117,194,233,457],"only":[69,243],"recently":[70],"protocols":[73,86,293,369,434],"started":[74],"become":[76],"efficient":[77,472],"enough":[78],"use":[80,126,288],"practice.":[82],"Today,":[83],"we":[84,264,426],"have":[85],"carry":[89],"out":[90],"large":[91],"complex":[93,485],"computations":[94],"very":[96,103,162,259],"reasonable":[97],"time":[98],"(and":[99],"even":[101],"fast,":[104],"depending":[105],"on":[106,175,401],"setting).":[111],"Despite":[112],"amazing":[114],"progress,":[115],"there":[116,170],"still":[118],"major":[120],"obstacle":[121],"adoption":[124],"due":[129],"huge":[132],"expertise":[133],"needed":[134],"design":[136],"specific":[138,163,248],"execution.":[140],"In":[141,165,261],"particular,":[142,420],"computed":[147],"needs":[148],"represented":[151],"as":[152,372],"appropriate":[154],"Boolean":[155,181,351],"or":[156],"arithmetic":[157,228,319,336,393],"circuit,":[158],"requires":[161],"expertise.":[164],"order":[166,386],"overcome":[168],"this,":[169],"has":[171],"been":[172],"considerable":[173],"work":[174,184,273],"compilation":[176],"code":[178,210],"(typically)":[180],"circuits.":[182,352],"One":[183],"direction":[187],"takes":[188,207],"different":[190,310],"approach,":[191],"SPDZ":[196,204,223,240,249,267,279,290,375,379,398],"compiler":[197,224,241,268,399,480],"(not":[198],"confused":[201],"with":[202,227,274,440],"protocol)":[205],"high-level":[208,358],"Python":[209],"provides":[212],"run-time":[215,383],"environment":[216],"executing":[219],"code.":[221],"deal":[226],"non-arithmetic":[230,395],"operations":[231],"extremely":[234],"powerful.":[235],"until":[237],"now,":[238],"could":[242],"used":[245],"family":[250],"protocols,":[252,313],"making":[253,378],"its":[254],"general":[255,275,382],"applicability":[256],"usefulness":[258],"limited.":[260],"paper,":[263],"extend":[265],"so":[269],"underlying":[276,368],"protocols.":[277,306,495],"Our":[278],"extensions":[280,481],"made":[282],"mind":[284],"make":[296],"easy":[298],"others":[300],"integrate":[302],"existing":[303],"new":[305,429],"We":[307,353,477],"integrated":[308],"three":[309],"types":[311],"honest-majority":[315],"protocol":[316,333,348],"computing":[318,335,350],"circuits":[320,337],"over":[321,338,438,493],"field":[323,404],"(for":[324],"number":[326],"parties),":[328],"three-party":[330],"honest":[331],"majority":[332],"ring":[340,417,437],"integers":[342,439],"Z2n,":[343],"BMR":[347],"show":[354],"single":[357],"SPDZ-Python":[359],"program":[360],"executed":[363],"using":[364],"all":[365,474,494],"(as":[370],"well":[371],"original":[374],"protocol),":[376],"thereby":[377],"true":[381],"environment.In":[385],"able":[389],"handle":[391],"both":[392],"operations,":[396],"relies":[400],"conversions":[402,412,445],"from":[403],"elements":[405,418],"bits":[407],"back.":[409],"do":[413],"not":[414],"apply":[415],"(in":[419],"they":[421],"require":[422],"element":[423],"division),":[424],"therefore":[427],"introduce":[428],"bit":[430,462],"decomposition":[431,463],"recomposition":[433],"replicated":[441],"secret":[442],"sharing.":[443],"These":[444],"are":[446,468],"independent":[448],"interest":[449],"utilize":[451],"structure":[453],"Z2n":[455],"(which":[456],"much":[458,470],"more":[459,471],"amenable":[460],"than":[464,473],"prime-order":[465],"fields),":[466],"previous":[475],"methods.":[476],"demonstrate":[478],"our":[479],"by":[482],"running":[483],"SQL":[486],"query":[487],"decision":[490],"tree":[491],"evaluation":[492]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
