{"id":"https://openalex.org/W3037821247","doi":"https://doi.org/10.1145/3372297.3417885","title":"Secure Single-Server Aggregation with (Poly)Logarithmic Overhead","display_name":"Secure Single-Server Aggregation with (Poly)Logarithmic Overhead","publication_year":2020,"publication_date":"2020-10-30","ids":{"openalex":"https://openalex.org/W3037821247","doi":"https://doi.org/10.1145/3372297.3417885","mag":"3037821247"},"language":"en","primary_location":{"id":"doi:10.1145/3372297.3417885","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417885","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417885","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417885","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005608903","display_name":"James Bell","orcid":"https://orcid.org/0000-0002-2265-1205"},"institutions":[{"id":"https://openalex.org/I4210128584","display_name":"The Alan Turing Institute","ror":"https://ror.org/035dkdb55","country_code":"GB","type":"facility","lineage":["https://openalex.org/I4210128584"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"James Henry Bell","raw_affiliation_strings":["The Alan Turing Institute, London, United Kingdom","The Alan Turing Institute, London (United Kingdom)"],"affiliations":[{"raw_affiliation_string":"The Alan Turing Institute, London, United Kingdom","institution_ids":["https://openalex.org/I4210128584"]},{"raw_affiliation_string":"The Alan Turing Institute, London (United Kingdom)","institution_ids":["https://openalex.org/I4210128584"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039153937","display_name":"Kallista Bonawitz","orcid":null},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kallista A. Bonawitz","raw_affiliation_strings":["Google, New York, NY, USA","Google,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Google, New York, NY, USA","institution_ids":["https://openalex.org/I1291425158"]},{"raw_affiliation_string":"Google,New York,NY,USA","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015542293","display_name":"Adri\u00e0 Gasc\u00f3n","orcid":"https://orcid.org/0000-0002-1807-8311"},"institutions":[{"id":"https://openalex.org/I4210113297","display_name":"Google (United Kingdom)","ror":"https://ror.org/024bc3e07","country_code":"GB","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210113297","https://openalex.org/I4210128969"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Adri\u00e0 Gasc\u00f3n","raw_affiliation_strings":["Google, London, United Kingdom","Google, London, United Kingdom#TAB#"],"affiliations":[{"raw_affiliation_string":"Google, London, United Kingdom","institution_ids":["https://openalex.org/I4210113297"]},{"raw_affiliation_string":"Google, London, United Kingdom#TAB#","institution_ids":["https://openalex.org/I4210113297"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037225703","display_name":"Tancr\u00e8de Lepoint","orcid":"https://orcid.org/0000-0003-3796-042X"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tancr\u00e8de Lepoint","raw_affiliation_strings":["Google, New York, NY, USA","Google,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Google, New York, NY, USA","institution_ids":["https://openalex.org/I1291425158"]},{"raw_affiliation_string":"Google,New York,NY,USA","institution_ids":["https://openalex.org/I1291425158"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089603958","display_name":"Mariana Raykova","orcid":"https://orcid.org/0000-0002-1744-4025"},"institutions":[{"id":"https://openalex.org/I1291425158","display_name":"Google (United States)","ror":"https://ror.org/00njsd438","country_code":"US","type":"company","lineage":["https://openalex.org/I1291425158","https://openalex.org/I4210128969"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mariana Raykova","raw_affiliation_strings":["Google, New York, NY, USA","Google,New York,NY,USA"],"affiliations":[{"raw_affiliation_string":"Google, New York, NY, USA","institution_ids":["https://openalex.org/I1291425158"]},{"raw_affiliation_string":"Google,New York,NY,USA","institution_ids":["https://openalex.org/I1291425158"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005608903"],"corresponding_institution_ids":["https://openalex.org/I4210128584"],"apc_list":null,"apc_paid":null,"fwci":1.46859549,"has_fulltext":true,"cited_by_count":13,"citation_normalized_percentile":{"value":0.84751077,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"2020","issue":null,"first_page":"1253","last_page":"1269"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.8390472531318665},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7922865152359009},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.690129280090332},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5560410618782043},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.5054352283477783},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4968924820423126},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.47013598680496216},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.443828284740448},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4373655915260315},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.435791552066803},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.43349170684814453},{"id":"https://openalex.org/keywords/commitment-scheme","display_name":"Commitment scheme","score":0.43089228868484497},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.4157170057296753},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4149310290813446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.37260931730270386},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.16264715790748596},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1544872224330902},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11314967274665833},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08464512228965759}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.8390472531318665},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7922865152359009},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.690129280090332},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5560410618782043},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.5054352283477783},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4968924820423126},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.47013598680496216},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.443828284740448},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4373655915260315},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.435791552066803},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.43349170684814453},{"id":"https://openalex.org/C91399829","wikidata":"https://www.wikidata.org/wiki/Q1115684","display_name":"Commitment scheme","level":3,"score":0.43089228868484497},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.4157170057296753},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4149310290813446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.37260931730270386},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.16264715790748596},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1544872224330902},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11314967274665833},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08464512228965759},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3372297.3417885","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417885","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417885","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"mag:3037821247","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2020/704.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":{"id":"doi:10.1145/3372297.3417885","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3372297.3417885","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3372297.3417885","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7799999713897705}],"awards":[],"funders":[{"id":"https://openalex.org/F4320313467","display_name":"Alan Turing Institute","ror":"https://ror.org/035dkdb55"},{"id":"https://openalex.org/F4320314707","display_name":"Government of the United Kingdom","ror":"https://ror.org/05wnh3t63"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3037821247.pdf","grobid_xml":"https://content.openalex.org/works/W3037821247.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1519947574","https://openalex.org/W1873763122","https://openalex.org/W2031533839","https://openalex.org/W2033974828","https://openalex.org/W2048994663","https://openalex.org/W2108834246","https://openalex.org/W2128865076","https://openalex.org/W2132172731","https://openalex.org/W2295522738","https://openalex.org/W2604969030","https://openalex.org/W2761138375","https://openalex.org/W2890748062","https://openalex.org/W2950321888","https://openalex.org/W2996422317","https://openalex.org/W3003257820","https://openalex.org/W3005594333","https://openalex.org/W3037821247"],"related_works":["https://openalex.org/W3096328345","https://openalex.org/W3088123628","https://openalex.org/W2920859554","https://openalex.org/W3106501308","https://openalex.org/W2767079719","https://openalex.org/W3214260160","https://openalex.org/W3111015719","https://openalex.org/W2407494784","https://openalex.org/W1497539597","https://openalex.org/W2985714690","https://openalex.org/W1533710990","https://openalex.org/W2996766874","https://openalex.org/W2922208295","https://openalex.org/W2743069163","https://openalex.org/W2765405339","https://openalex.org/W3119528097","https://openalex.org/W2111388002","https://openalex.org/W2488997828","https://openalex.org/W2794166119","https://openalex.org/W2162967659"],"abstract_inverted_index":{"Secure":[0],"aggregation":[1,69,161,238],"is":[2],"a":[3,8,27,47,96,131,164,179,203],"cryptographic":[4],"primitive":[5],"that":[6,29,70,205],"enables":[7,46,246],"server":[9,94],"to":[10,105,115,193,201,224,239],"learn":[11],"the":[12,15,39,64,83,86,90,93,99,109,117,127,139,144,168,172,183,199,213,240,247,253],"sum":[13],"of":[14,18,41,50,60,98,121,134,171,174,198,215,236,242,252,256],"vector":[16],"inputs":[17,214],"many":[19],"clients.":[20,110,181],"Bonawitz":[21,122,175],"et":[22,123,176],"al.":[23,177],"(CCS":[24],"2017)":[25],"presented":[26],"construction":[28],"incurs":[30],"computation":[31,75],"and":[32,74,85,95,101,228],"communication":[33,73,119],"for":[34,67,147,178],"each":[35,190],"client":[36,191],"linear":[37,128],"in":[38,82],"number":[40],"parties.":[42],"While":[43],"this":[44],"functionality":[45],"broad":[48],"range":[49],"privacy":[51],"preserving":[52],"computational":[53],"tasks,":[54],"scaling":[55],"concerns":[56],"limit":[57],"its":[58,206],"scope":[59],"use.":[61],"We":[62,231],"present":[63],"first":[65,248],"constructions":[66,79,112,151],"secure":[68,148,160,237,243,250],"achieve":[71,153],"polylogarithmic":[72],"per":[76],"client.":[77],"Our":[78,111],"provide":[80],"security":[81,140],"semi-honest":[84,159],"semi-malicious":[87,184],"settings":[88],"where":[89],"adversary":[91],"controls":[92],"\u03b4-fraction":[97,106],"clients,":[100,189,220],"correctness":[102],"with":[103,130,186,196,212],"up":[104,223],"dropouts":[107],"among":[108],"show":[113,233],"how":[114],"replace":[116],"complete":[118],"graph":[120,133],"al.,":[124],"which":[125,245],"entails":[126],"overheads,":[129],"k-regular":[132],"logarithmic":[135],"degree":[136],"while":[137,221],"maintaining":[138],"guarantees.":[141],"Beyond":[142],"improving":[143],"known":[145],"asymptotics":[146],"aggregation,":[149],"our":[150],"also":[152,232],"very":[154],"efficient":[155],"concrete":[156],"parameters.":[157],"The":[158],"can":[162],"handle":[163],"billion":[165],"clients":[166,200,227],"at":[167,216],"per-client":[169],"cost":[170],"protocol":[173],"thousand":[180],"In":[182],"setting":[185],"10":[187],"4":[188],"needs":[192],"communicate":[194],"only":[195],"3%":[197],"have":[202],"guarantee":[204],"input":[207],"has":[208],"been":[209],"added":[210],"together":[211],"least":[217],"5000":[218],"other":[219],"withstanding":[222],"5%":[225,229],"corrupt":[226],"dropouts.":[230],"an":[234],"application":[235],"task":[241],"shuffling":[244],"cryptographically":[249],"instantiation":[251],"shuffle":[254],"model":[255],"differential":[257],"privacy.":[258]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
