{"id":"https://openalex.org/W2895977435","doi":"https://doi.org/10.1145/3243734.3264419","title":"Secure Multi-Party Computation","display_name":"Secure Multi-Party Computation","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2895977435","doi":"https://doi.org/10.1145/3243734.3264419","mag":"2895977435"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3264419","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3264419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5057525194","display_name":"Fattaneh Bayatbabolghani","orcid":null},"institutions":[{"id":"https://openalex.org/I95457486","display_name":"University of California, Berkeley","ror":"https://ror.org/01an7q238","country_code":"US","type":"education","lineage":["https://openalex.org/I95457486"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Fattaneh Bayatbabolghani","raw_affiliation_strings":["University of California, Berkeley, Berkeley, CA, USA"],"affiliations":[{"raw_affiliation_string":"University of California, Berkeley, Berkeley, CA, USA","institution_ids":["https://openalex.org/I95457486"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086333356","display_name":"Marina Blanton","orcid":"https://orcid.org/0009-0008-9934-2700"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Marina Blanton","raw_affiliation_strings":["University at Buffalo, The State University of New York, Buffalo, NY, USA"],"affiliations":[{"raw_affiliation_string":"University at Buffalo, The State University of New York, Buffalo, NY, USA","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5057525194"],"corresponding_institution_ids":["https://openalex.org/I95457486"],"apc_list":null,"apc_paid":null,"fwci":1.3031,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.85506264,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2157","last_page":"2159"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.8290247917175293},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8165786862373352},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.7316327095031738},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.7236078977584839},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.5581793189048767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5523048639297485},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5199124217033386},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.493068665266037},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4870057702064514},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.4712422490119934},{"id":"https://openalex.org/keywords/cover","display_name":"Cover (algebra)","score":0.4634210169315338},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.4230985641479492},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4168374538421631},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.3528820276260376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.23213163018226624},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18592137098312378},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1035412847995758}],"concepts":[{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.8290247917175293},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8165786862373352},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.7316327095031738},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.7236078977584839},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.5581793189048767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5523048639297485},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5199124217033386},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.493068665266037},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4870057702064514},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.4712422490119934},{"id":"https://openalex.org/C2780428219","wikidata":"https://www.wikidata.org/wiki/Q16952335","display_name":"Cover (algebra)","level":2,"score":0.4634210169315338},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.4230985641479492},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4168374538421631},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3528820276260376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.23213163018226624},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18592137098312378},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1035412847995758},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3264419","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3264419","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W54526233","https://openalex.org/W99790955","https://openalex.org/W173953576","https://openalex.org/W1485800369","https://openalex.org/W1520270249","https://openalex.org/W1521253015","https://openalex.org/W1521730416","https://openalex.org/W1528693676","https://openalex.org/W1534543185","https://openalex.org/W1574373886","https://openalex.org/W1635361314","https://openalex.org/W1826277484","https://openalex.org/W1982146060","https://openalex.org/W2011112377","https://openalex.org/W2019891719","https://openalex.org/W2027471022","https://openalex.org/W2036133214","https://openalex.org/W2059671515","https://openalex.org/W2081256122","https://openalex.org/W2088492763","https://openalex.org/W2099058328","https://openalex.org/W2099221302","https://openalex.org/W2134340933","https://openalex.org/W2141420453","https://openalex.org/W2145818182","https://openalex.org/W2157314106","https://openalex.org/W2246792095","https://openalex.org/W2402235285","https://openalex.org/W2403789702","https://openalex.org/W2560917486","https://openalex.org/W2753005465","https://openalex.org/W2794685135","https://openalex.org/W2949933192","https://openalex.org/W2970097841","https://openalex.org/W2990399857"],"related_works":["https://openalex.org/W2083084382","https://openalex.org/W2397857137","https://openalex.org/W1557783852","https://openalex.org/W2768332800","https://openalex.org/W2188298058","https://openalex.org/W3214129216","https://openalex.org/W2129756153","https://openalex.org/W2006088653","https://openalex.org/W2950578674","https://openalex.org/W2564297870"],"abstract_inverted_index":{"Secure":[0],"multi-party":[1,95],"computation":[2],"(SMC)":[3],"is":[4],"an":[5],"emerging":[6],"topic":[7],"which":[8,21,87,162,242],"has":[9],"been":[10],"drawing":[11],"growing":[12],"attention":[13],"during":[14],"recent":[15,70,127,220],"decades.":[16],"There":[17],"are":[18,88],"many":[19],"examples":[20],"show":[22],"importance":[23],"of":[24,51,65,144,153,177,196,234],"SMC":[25,52,74],"constructions":[26,222],"in":[27,72,174,193],"practice,":[28],"such":[29,129],"as":[30,130],"privacy-preserving":[31],"decision":[32],"making":[33,156],"and":[34,41,58,82,94,106,123,141,167,190,198,216,225,238],"machine":[35],"learning,":[36],"auctions,":[37],"private":[38],"set":[39],"intersection,":[40],"others.":[42],"In":[43,180],"this":[44],"tutorial,":[45],"we":[46,110,182,203],"provide":[47],"a":[48,62,151],"comprehensive":[49],"coverage":[50,99,230],"techniques,":[53],"starting":[54],"from":[55,205],"precise":[56],"definitions":[57],"fundamental":[59],"techniques.":[60,147],"Consequently,":[61],"significant":[63],"portion":[64],"the":[66,113,131,134,138,142,164,175,194,209],"tutorial":[67],"focuses":[68],"on":[69],"advances":[71],"general":[73],"constructions.":[75],"We":[76,148],"cover":[77,125],"garbled":[78,116,135],"circuit":[79],"evaluation":[80],"(GCE)":[81],"linear":[83],"secret":[84],"sharing":[85],"(LSS)":[86],"commonly":[89],"used":[90],"for":[91,120,155,186,208,223],"secure":[92],"two-party":[93],"computation,":[96],"respectively.":[97],"The":[98,229],"includes":[100,163,231],"both":[101],"standard":[102,206],"adversarial":[103,211,227],"models:":[104],"semi-honest":[105,121,197,210,224],"malicious.":[107],"For":[108,201],"GCE,":[109],"start":[111,204],"with":[112,150,246],"original":[114],"Yao's":[115],"circuits":[117],"construction":[118],"[30]":[119],"adversaries":[122],"consequently":[124,217],"its":[126],"optimizations":[128],"\"free":[132],"XOR,''":[133],"row":[136],"reduction,":[137],"half-gates":[139],"optimization,":[140],"use":[143],"AES":[145],"NI":[146],"follow":[149],"discussion":[152],"techniques":[154,169],"GCE":[157],"resilient":[158],"to":[159,170,219,248],"malicious":[160,178,199,226],"behavior,":[161],"cut-and-choose":[165],"approach":[166],"additional":[168],"deter":[171],"known":[172],"attacks":[173],"presence":[176,195],"participants.":[179],"addition,":[181],"include":[183],"the-state-of-the-art":[184],"protocols":[185],"oblivious":[187],"transfer":[188],"(OT)":[189],"OT":[191],"extension":[192],"users.":[200],"LSS,":[202],"solutions":[207],"model":[212],"including":[213],"[5,":[214],"28]":[215],"move":[218],"efficient":[221],"models.":[228],"different":[232,244],"types":[233],"corruption":[235],"thresholds":[236],"(with":[237],"without":[239],"honest":[240],"majority),":[241],"imply":[243],"guarantees":[245],"respect":[247],"abort.":[249]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
