{"id":"https://openalex.org/W3092422523","doi":"https://doi.org/10.1145/3320269.3384752","title":"BOREALIS: Building Block for Sealed Bid Auctions on Blockchains","display_name":"BOREALIS: Building Block for Sealed Bid Auctions on Blockchains","publication_year":2020,"publication_date":"2020-10-05","ids":{"openalex":"https://openalex.org/W3092422523","doi":"https://doi.org/10.1145/3320269.3384752","mag":"3092422523"},"language":"en","primary_location":{"id":"doi:10.1145/3320269.3384752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045932031","display_name":"Erik-Oliver Bla\u00df","orcid":"https://orcid.org/0009-0008-2791-1564"},"institutions":[{"id":"https://openalex.org/I4210136903","display_name":"Airbus (Germany)","ror":"https://ror.org/04a3akw68","country_code":"DE","type":"company","lineage":["https://openalex.org/I4210121748","https://openalex.org/I4210136903"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Erik-Oliver Blass","raw_affiliation_strings":["Airbus, Munich, Germany"],"affiliations":[{"raw_affiliation_string":"Airbus, Munich, Germany","institution_ids":["https://openalex.org/I4210136903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102985450","display_name":"Florian Kerschbaum","orcid":"https://orcid.org/0000-0003-4288-2286"},"institutions":[{"id":"https://openalex.org/I151746483","display_name":"University of Waterloo","ror":"https://ror.org/01aff2v68","country_code":"CA","type":"education","lineage":["https://openalex.org/I151746483"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Florian Kerschbaum","raw_affiliation_strings":["University of Waterloo, Waterloo, ON, Canada"],"affiliations":[{"raw_affiliation_string":"University of Waterloo, Waterloo, ON, Canada","institution_ids":["https://openalex.org/I151746483"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5045932031"],"corresponding_institution_ids":["https://openalex.org/I4210136903"],"apc_list":null,"apc_paid":null,"fwci":1.9884,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.89256517,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"558","last_page":"571"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6787356734275818},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6605124473571777},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.6209419965744019},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5182626247406006},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4934612810611725},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4790821671485901},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.4761236310005188},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.44766002893447876},{"id":"https://openalex.org/keywords/integer","display_name":"Integer (computer science)","score":0.43389034271240234},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.4291929304599762},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.26282429695129395},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.23467117547988892}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6787356734275818},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6605124473571777},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.6209419965744019},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5182626247406006},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4934612810611725},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4790821671485901},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.4761236310005188},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.44766002893447876},{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.43389034271240234},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.4291929304599762},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26282429695129395},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.23467117547988892},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3320269.3384752","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3320269.3384752","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G6307210480","display_name":null,"funder_award_id":"RGPIN-05849,RGPAS-507908,DGDND-00085","funder_id":"https://openalex.org/F4320321487","funder_display_name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada"}],"funders":[{"id":"https://openalex.org/F4320321487","display_name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W111114747","https://openalex.org/W851575271","https://openalex.org/W1520726018","https://openalex.org/W1534636449","https://openalex.org/W1536311772","https://openalex.org/W1537409952","https://openalex.org/W1579771234","https://openalex.org/W1595357546","https://openalex.org/W1888364621","https://openalex.org/W1935182841","https://openalex.org/W1974392920","https://openalex.org/W2006453614","https://openalex.org/W2027471022","https://openalex.org/W2031015560","https://openalex.org/W2038228603","https://openalex.org/W2039605106","https://openalex.org/W2040168265","https://openalex.org/W2051971152","https://openalex.org/W2076458424","https://openalex.org/W2104147801","https://openalex.org/W2113474134","https://openalex.org/W2114870379","https://openalex.org/W2130901615","https://openalex.org/W2150509722","https://openalex.org/W2402235285","https://openalex.org/W2517744317","https://openalex.org/W2536058570","https://openalex.org/W2537981027","https://openalex.org/W2572799557","https://openalex.org/W2580257616","https://openalex.org/W2765321722","https://openalex.org/W2795048425","https://openalex.org/W2903286646","https://openalex.org/W2911825405","https://openalex.org/W3031847131","https://openalex.org/W3141796657"],"related_works":["https://openalex.org/W2312500729","https://openalex.org/W2518050971","https://openalex.org/W2026228941","https://openalex.org/W2947510282","https://openalex.org/W3106998306","https://openalex.org/W2363701519","https://openalex.org/W1484081998","https://openalex.org/W2985442649","https://openalex.org/W2601739120","https://openalex.org/W4289129300"],"abstract_inverted_index":{"We":[0],"focus":[1],"on":[2,202],"securely":[3,17,40],"computing":[4],"the":[5,19,24,29,108,180],"ranks":[6,85],"of":[7,44,84,110,134,151,177,182,231,240],"sealed":[8],"integers":[9,178,236],"distributed":[10],"among":[11,86],"n":[12],"parties.":[13],"For":[14],"example,":[15],"we":[16,68,138],"compute":[18],"largest":[20],"or":[21,26,59],"smallest":[22],"integer,":[23],"median,":[25],"in":[27,164,172,224],"general":[28],"kth-ranked":[30],"integer.":[31],"Such":[32],"computations":[33],"are":[34,65],"a":[35,42,78,148,228,246],"useful":[36],"building":[37],"block":[38,249],"to":[39,56,93,106],"implement":[41,94],"variety":[43],"sealed-bid":[45],"auctions.":[46],"Our":[47],"objective":[48],"is":[49,170,186,213,222,243],"efficiency,":[50],"specifically":[51],"low":[52],"interactivity":[53],"between":[54],"parties":[55,183,232],"support":[57],"blockchains":[58],"other":[60],"scenarios":[61],"where":[62],"multiple":[63],"rounds":[64,168],"time-consuming.":[66],"Hence,":[67],"dismiss":[69],"powerful,":[70],"yet":[71],"highly-interactive":[72],"MPC":[73],"frameworks":[74],"and":[75,128,154,179,234],"propose":[76],"BOREALIS,":[77],"special-purpose":[79],"protocol":[80],"for":[81,227],"secure":[82,158,195],"computation":[83,150,197,238],"integers.":[87],"BOREALIS":[88,130,146,162,212],"uses":[89],"additively":[90],"homomorphic":[91,205],"encryption":[92],"core":[95],"comparisons,":[96,123],"but":[97,191],"computes":[98],"under":[99],"distinct":[100],"keys,":[101],"chosen":[102],"by":[103],"each":[104],"party":[105],"optimize":[107],"number":[109,181,230],"rounds.":[111],"By":[112],"carefully":[113],"combining":[114],"cryptographic":[115],"primitives,":[116],"such":[117],"as":[118],"ECC":[119],"Elgamal":[120],"encryption,":[121],"encrypted":[122],"ciphertext":[124],"blinding,":[125],"secret":[126],"sharing,":[127],"shuffling,":[129],"sets":[131],"up":[132],"systems":[133],"multi-scalar":[135],"equations":[136],"which":[137,169],"efficiently":[139],"prove":[140],"with":[141],"Groth-Sahai":[142],"ZK":[143,219],"proofs.":[144],"Therewith,":[145],"implements":[147],"multi-party":[149,196],"pairwise":[152],"comparisons":[153],"rank":[155],"zero-knowledge":[156],"proofs":[157,242],"against":[159],"malicious":[160],"adversaries.":[161],"completes":[163],"at":[165],"most":[166],"4":[167],"constant":[171],"both":[173],"bit":[174],"length":[175],"l":[176],"n.":[184],"This":[185],"not":[187],"only":[188],"asymptotically":[189],"optimal,":[190],"surpasses":[192],"generic":[193],"constant-round":[194],"protocols,":[198],"even":[199],"those":[200],"based":[201],"shared-key":[203],"fully":[204],"encryption.":[206],"Furthermore,":[207],"our":[208],"implementation":[209],"shows":[210],"that":[211],"very":[214],"practical.":[215],"Its":[216],"main":[217],"bottleneck,":[218],"proof":[220],"computations,":[221],"small":[223],"practice.":[225],"Even":[226],"large":[229],"(n=200)":[233],"high-precision":[235],"(l=32),":[237],"time":[239],"all":[241],"less":[244],"than":[245],"single":[247],"Bitcoin":[248],"interval.":[250]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
