{"id":"https://openalex.org/W2985714690","doi":"https://doi.org/10.1145/3319535.3363227","title":"Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs","display_name":"Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2985714690","doi":"https://doi.org/10.1145/3319535.3363227","mag":"2985714690"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3363227","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3363227","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079669889","display_name":"Elette Boyle","orcid":"https://orcid.org/0009-0002-0360-8129"},"institutions":[{"id":"https://openalex.org/I4210093787","display_name":"Herzliya Medical Center","ror":"https://ror.org/00m6hsp80","country_code":"IL","type":"healthcare","lineage":["https://openalex.org/I4210093787"]},{"id":"https://openalex.org/I138898306","display_name":"Reichman University","ror":"https://ror.org/01px5cv07","country_code":"IL","type":"education","lineage":["https://openalex.org/I138898306"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Elette Boyle","raw_affiliation_strings":["IDC Herzliya, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"IDC Herzliya, Herzliya, Israel","institution_ids":["https://openalex.org/I4210093787","https://openalex.org/I138898306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046229987","display_name":"Niv Gilboa","orcid":"https://orcid.org/0000-0001-7209-3494"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Niv Gilboa","raw_affiliation_strings":["Ben-Gurion University, Beer Sheva, Israel"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081852077","display_name":"Yuval Ishai","orcid":"https://orcid.org/0009-0009-4096-6305"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yuval Ishai","raw_affiliation_strings":["Technion, Haifa, Israel"],"affiliations":[{"raw_affiliation_string":"Technion, Haifa, Israel","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031866855","display_name":"Ariel Nof","orcid":"https://orcid.org/0009-0007-4852-083X"},"institutions":[{"id":"https://openalex.org/I13955877","display_name":"Bar-Ilan University","ror":"https://ror.org/03kgsv495","country_code":"IL","type":"education","lineage":["https://openalex.org/I13955877"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Ariel Nof","raw_affiliation_strings":["Bar-Ilan University, Ramat-Gan, Israel"],"affiliations":[{"raw_affiliation_string":"Bar-Ilan University, Ramat-Gan, Israel","institution_ids":["https://openalex.org/I13955877"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5079669889"],"corresponding_institution_ids":["https://openalex.org/I138898306","https://openalex.org/I4210093787"],"apc_list":null,"apc_paid":null,"fwci":3.4684,"has_fulltext":false,"cited_by_count":51,"citation_normalized_percentile":{"value":0.94253531,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"869","last_page":"886"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7432726621627808},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.7030965089797974},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.6169015765190125},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.5881186723709106},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5776587128639221},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5595836043357849},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.539841890335083},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.529144823551178},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.5240521430969238},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.5194727778434753},{"id":"https://openalex.org/keywords/boolean-circuit","display_name":"Boolean circuit","score":0.5143805146217346},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.5067251324653625},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49780726432800293},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4346916675567627},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.42305994033813477},{"id":"https://openalex.org/keywords/sublinear-function","display_name":"Sublinear function","score":0.42265427112579346},{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.4130701720714569},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.34419113397598267},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2895292043685913},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.27910125255584717},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2538284957408905},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.21720680594444275},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2077077031135559}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7432726621627808},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.7030965089797974},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.6169015765190125},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.5881186723709106},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5776587128639221},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5595836043357849},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.539841890335083},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.529144823551178},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.5240521430969238},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.5194727778434753},{"id":"https://openalex.org/C141796577","wikidata":"https://www.wikidata.org/wiki/Q837479","display_name":"Boolean circuit","level":3,"score":0.5143805146217346},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.5067251324653625},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49780726432800293},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4346916675567627},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.42305994033813477},{"id":"https://openalex.org/C117160843","wikidata":"https://www.wikidata.org/wiki/Q338652","display_name":"Sublinear function","level":2,"score":0.42265427112579346},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.4130701720714569},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.34419113397598267},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2895292043685913},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.27910125255584717},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2538284957408905},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.21720680594444275},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2077077031135559},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3363227","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3363227","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8299999833106995,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1531368347","https://openalex.org/W1997859100","https://openalex.org/W1999721188","https://openalex.org/W2003668524","https://openalex.org/W2082624086","https://openalex.org/W2117362057","https://openalex.org/W2169194339","https://openalex.org/W2536058570","https://openalex.org/W2614104334","https://openalex.org/W2704367133","https://openalex.org/W2794500245","https://openalex.org/W2794855042","https://openalex.org/W2805909171","https://openalex.org/W2889904427","https://openalex.org/W2891063150","https://openalex.org/W2892199772","https://openalex.org/W2895865029","https://openalex.org/W2927379348","https://openalex.org/W2969140724","https://openalex.org/W2984746198","https://openalex.org/W3009972770","https://openalex.org/W3106501308","https://openalex.org/W4236563753"],"related_works":["https://openalex.org/W4293056000","https://openalex.org/W2952662274","https://openalex.org/W2587122949","https://openalex.org/W3028657148","https://openalex.org/W2899423027","https://openalex.org/W173892823","https://openalex.org/W2793916198","https://openalex.org/W4285248495","https://openalex.org/W1999731694","https://openalex.org/W2120315802"],"abstract_inverted_index":{"Secure":[0],"multiparty":[1],"computation":[2,14,212],"enables":[3],"a":[4,12,35,84,88,100,206,227,328,333],"set":[5],"of":[6,31,139,175,209,235,244],"parties":[7,33],"to":[8,68,157,285,331],"securely":[9],"carry":[10],"out":[11],"joint":[13],"on":[15,172,185,195,233,311],"their":[16],"private":[17],"inputs":[18],"without":[19,336],"revealing":[20],"anything":[21],"but":[22],"the":[23,118,149,231,236,247,251,263,272,282,318,324],"output.":[24],"A":[25],"particularly":[26,45],"motivated":[27],"setting":[28,43,80],"is":[29,44,254,315],"that":[30],"three":[32],"with":[34,81,96,136,189,226,307,317],"single":[36],"corruption":[37],"(hereafter":[38],"denoted":[39],"3PC).":[40],"This":[41,314],"3PC":[42,129,283,321],"appealing":[46],"for":[47,131,166,181,219,246,274],"two":[48],"main":[49],"reasons:":[50],"(1)":[51],"it":[52,64],"admits":[53],"more":[54],"efficient":[55,75,112,191],"MPC":[56],"protocols":[57,76,95,164,322],"than":[58,242],"in":[59,66,262],"other":[60],"standard":[61],"settings;":[62],"(2)":[63],"allows":[65],"principle":[67],"achieve":[69],"full":[70,288],"security":[71,82,98],"(and":[72],"fairness).":[73],"Highly":[74],"exist":[77],"within":[78,110],"this":[79,104,108],"against":[83,99],"semi-honest</>":[85],"adversary;":[86],"however,":[87],"significant":[89],"gap":[90,109],"remains":[91],"between":[92],"these":[93],"and":[94,211,223,270,306],"stronger":[97],"malicious</>":[101],"adversary.":[102],"In":[103,266],"paper,":[105],"we":[106,116,268],"narrow":[107],"concretely":[111],"protocols.":[113,152],"More":[114],"explicitly,":[115],"have":[117],"following":[119],"contributions:":[120],"Concretely":[121],"Efficient":[122],"Malicious":[123],"3PC.":[124],"We":[125,204,280],"present":[126,205],"an":[127,190],"optimized":[128],"protocol":[130,154,170,193,238,273,284],"arithmetic":[132],"circuits":[133],"over":[134,162],"rings":[135],"(amortized)":[137],"communication":[138,210,245,300],"1":[140,297],"ring":[141,298],"element":[142,299],"per":[143,146,260,301,303],"multiplication":[144,304],"gate":[145,261],"party,":[147],"matching":[148],"best":[150,319],"semi-honest":[151,192,237],"The":[153],"applies":[155],"also":[156],"Boolean":[158,224],"circuits,":[159],"significantly":[160],"improving":[161],"previous":[163,320],"even":[165],"small":[167],"circuits.":[168],"Our":[169],"builds":[171],"recent":[173],"techniques":[174],"Boneh":[176],"et":[177,200],"al.":[178],"(Crypto":[179],"2019)":[180],"sublinear":[182],"zero-knowledge":[183],"proofs":[184],"distributed":[186],"data,":[187],"together":[188],"based":[194],"replicated":[196],"secret":[197],"sharing":[198],"(Araki":[199],"al.,":[201],"CCS":[202],"2016).":[203],"concrete":[207,312],"analysis":[208],"costs,":[213],"including":[214],"several":[215],"optimizations.":[216],"For":[217],"example,":[218],"40-bit":[220],"statistical":[221],"security,":[222],"circuit":[225,276],"million":[228],"(nonlinear)":[229],"gates,":[230],"overhead":[232,253],"top":[234],"can":[239],"involve":[240],"less":[241],"0.5KB":[243],"entire":[248],"circuit,</>":[249],"while":[250,294],"computational":[252],"dominated":[255],"by":[256],"roughly":[257],"30":[258],"multiplications":[259],"field":[264],"F247.":[265],"addition,":[267],"implemented":[269],"benchmarked":[271],"varied":[275],"sizes.":[277],"Full":[278],"Security.":[279],"augment":[281],"further":[286],"provide":[287],"security</>":[289],"(with":[290],"guaranteed":[291],"output":[292],"delivery)":[293],"maintaining":[295],"amortized":[296],"party":[302,330],"gate,":[305],"hardly":[308],"any":[309],"impact":[310],"efficiency.":[313],"contrasted":[316],"from":[323],"literature,":[325],"which":[326],"allow":[327],"corrupt":[329],"mount":[332],"denial-of-service":[334],"attack":[335],"being":[337],"detected.":[338]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":9},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":6}],"updated_date":"2026-03-17T09:09:15.849793","created_date":"2025-10-10T00:00:00"}
