{"id":"https://openalex.org/W3201659546","doi":"https://doi.org/10.1145/3460120.3484772","title":"Simple, Fast Malicious Multiparty Private Set Intersection","display_name":"Simple, Fast Malicious Multiparty Private Set Intersection","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3201659546","doi":"https://doi.org/10.1145/3460120.3484772","mag":"3201659546"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484772","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484772","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026435765","display_name":"Ofri Nevo","orcid":null},"institutions":[{"id":"https://openalex.org/I164950643","display_name":"Open University of Israel","ror":"https://ror.org/027z64205","country_code":"IL","type":"education","lineage":["https://openalex.org/I164950643"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Ofri Nevo","raw_affiliation_strings":["Open University of Israel, Ra'anana, Israel"],"affiliations":[{"raw_affiliation_string":"Open University of Israel, Ra'anana, Israel","institution_ids":["https://openalex.org/I164950643"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028189452","display_name":"Ni Trieu","orcid":"https://orcid.org/0000-0001-6013-9512"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ni Trieu","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021969156","display_name":"Avishay Yanai","orcid":"https://orcid.org/0000-0003-4060-0150"},"institutions":[{"id":"https://openalex.org/I4210093787","display_name":"Herzliya Medical Center","ror":"https://ror.org/00m6hsp80","country_code":"IL","type":"healthcare","lineage":["https://openalex.org/I4210093787"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Avishay Yanai","raw_affiliation_strings":["VMware Research, Herzliya, Israel"],"affiliations":[{"raw_affiliation_string":"VMware Research, Herzliya, Israel","institution_ids":["https://openalex.org/I4210093787"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5026435765"],"corresponding_institution_ids":["https://openalex.org/I164950643"],"apc_list":null,"apc_paid":null,"fwci":0.28220715,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.63656582,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2021","issue":null,"first_page":"1151","last_page":"1165"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9796000123023987,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.82002854347229},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6751503944396973},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6290454268455505},{"id":"https://openalex.org/keywords/collusion","display_name":"Collusion","score":0.6094433665275574},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5492947697639465},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5383116006851196},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5009164810180664},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.4873736500740051},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48513612151145935},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44674503803253174},{"id":"https://openalex.org/keywords/simple","display_name":"Simple (philosophy)","score":0.43666309118270874},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.34363317489624023}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.82002854347229},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6751503944396973},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6290454268455505},{"id":"https://openalex.org/C2781198186","wikidata":"https://www.wikidata.org/wiki/Q701521","display_name":"Collusion","level":2,"score":0.6094433665275574},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5492947697639465},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5383116006851196},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5009164810180664},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.4873736500740051},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48513612151145935},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44674503803253174},{"id":"https://openalex.org/C2780586882","wikidata":"https://www.wikidata.org/wiki/Q7520643","display_name":"Simple (philosophy)","level":2,"score":0.43666309118270874},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34363317489624023},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3460120.3484772","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484772","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"mag:3201659546","is_oa":false,"landing_page_url":"https://eprint.iacr.org/2021/1221.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S2764847869","display_name":"IACR Cryptology ePrint Archive","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":["https://openalex.org/P4322614454"],"host_organization_lineage_names":["Cryptology ePrint Archive"],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Cryptology ePrint Archive","raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.800000011920929}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1597844714","https://openalex.org/W1889757464","https://openalex.org/W2022560353","https://openalex.org/W2143087446","https://openalex.org/W2146747654","https://openalex.org/W2212846837","https://openalex.org/W2286683564","https://openalex.org/W2535199873","https://openalex.org/W2573337238","https://openalex.org/W2585287165","https://openalex.org/W2612145958","https://openalex.org/W2767023267","https://openalex.org/W2794672641","https://openalex.org/W2821751932","https://openalex.org/W2887239198","https://openalex.org/W2922077514","https://openalex.org/W2951013199","https://openalex.org/W2951319065","https://openalex.org/W2983807000","https://openalex.org/W2986249453","https://openalex.org/W3013638630","https://openalex.org/W3015106467","https://openalex.org/W3023633122","https://openalex.org/W3037145554","https://openalex.org/W3090731045","https://openalex.org/W3091347766","https://openalex.org/W3095102583","https://openalex.org/W3166373439","https://openalex.org/W6680867728"],"related_works":["https://openalex.org/W3214727018","https://openalex.org/W2767079258","https://openalex.org/W2983807000","https://openalex.org/W2951941706","https://openalex.org/W1556948092","https://openalex.org/W2560917486","https://openalex.org/W3032562924","https://openalex.org/W87723157","https://openalex.org/W2267584523","https://openalex.org/W2155605313","https://openalex.org/W2790786660","https://openalex.org/W2949142656","https://openalex.org/W1670781499","https://openalex.org/W2402046423","https://openalex.org/W1999731694","https://openalex.org/W2951667727","https://openalex.org/W604178703","https://openalex.org/W2293776292","https://openalex.org/W1511759920","https://openalex.org/W2398239478"],"abstract_inverted_index":{"We":[0,163,189],"address":[1],"the":[2,51,58,74,94,129,132,139,159,194,200,204,212],"problem":[3],"of":[4,50,131,161,193,196],"multiparty":[5],"private":[6],"set":[7,133],"intersection":[8],"against":[9,43],"a":[10,40,82,85,110,117,121,191],"malicious":[11,152,213],"adversary.":[12],"First,":[13],"we":[14,38],"show":[15,137],"that":[16,138,155],"when":[17],"one":[18],"can":[19],"assume":[20],"no":[21],"collusion":[22],"amongst":[23],"corrupted":[24],"parties":[25,181],"then":[26],"there":[27],"exists":[28],"an":[29,44,100,169],"extremely":[30],"efficient":[31],"protocol":[32,41,54,166,198],"given":[33],"only":[34,108],"symmetric-key":[35],"primitives.":[36],"Second,":[37],"present":[39],"secure":[42],"adversary":[45],"corrupting":[46],"any":[47],"strict":[48],"subset":[49],"parties.":[52,162],"Our":[53,71,135],"is":[55,80,127],"based":[56],"on":[57],"recently":[59],"introduced":[60],"primitives:":[61],"oblivious":[62,67],"programmable":[63],"PRF":[64],"(OPPRF)":[65],"and":[66,116,151,154,167,175,177,199,211,220],"key-value":[68],"store":[69],"(OKVS).":[70],"protocols":[72],"follow":[73],"client-server":[75],"model":[76],"where":[77,93],"each":[78,114],"party":[79,123],"either":[81],"client":[83,95],"or":[84],"server.":[86],"However,":[87],"in":[88,99,128],"contrast":[89],"to":[90,97,113,120,145,148,179,184],"previous":[91],"works":[92],"has":[96],"engage":[98],"expensive":[101],"interactive":[102],"cryptographic":[103],"protocol,":[104],"our":[105,165,197],"clients":[106],"need":[107],"send":[109],"single":[111,118],"key":[112],"server":[115],"message":[119,125],"pivot":[122],"(where":[124],"size":[126],"order":[130],"size).":[134],"experiments":[136],"client's":[140],"load":[141],"improves":[142],"by":[143],"up":[144,178,183],"10x":[146],"(compared":[147],"both":[149,173,203],"semi-honest":[150,205],"settings)":[153],"factor":[156],"increases":[157],"with":[158,182],"number":[160],"implemented":[164],"conducted":[168],"extensive":[170],"experiment":[171],"over":[172],"LAN":[174],"WAN":[176],"32":[180],"$2^20":[185],"$":[186],"items":[187],"each.":[188],"provide":[190],"comparison":[192],"performance":[195],"state-of-the-art":[201],"for":[202],"setting":[206,214],"(by":[207,215],"Chandran":[208],"et":[209,218,222],"al.)":[210],"Ben":[216],"Efraim":[217],"al.":[219],"Garimella":[221],"al.).":[223]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
