{"id":"https://openalex.org/W3204714261","doi":"https://doi.org/10.1145/3460120.3485256","title":"Amortized Threshold Symmetric-key Encryption","display_name":"Amortized Threshold Symmetric-key Encryption","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3204714261","doi":"https://doi.org/10.1145/3460120.3485256","mag":"3204714261"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3485256","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3485256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"preprint","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5050855162","display_name":"Mihai Christodorescu","orcid":"https://orcid.org/0000-0001-5808-8015"},"institutions":[{"id":"https://openalex.org/I4210148469","display_name":"Visa (United States)","ror":"https://ror.org/05t1y0b59","country_code":"US","type":"company","lineage":["https://openalex.org/I4210148469"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mihai Christodorescu","raw_affiliation_strings":["Visa Research, Palo Alto, CA, USA"],"affiliations":[{"raw_affiliation_string":"Visa Research, Palo Alto, CA, USA","institution_ids":["https://openalex.org/I4210148469"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041119321","display_name":"Sivanarayana Gaddam","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Sivanarayana Gaddam","raw_affiliation_strings":["C3 Inc., Redwood City, CA, USA"],"affiliations":[{"raw_affiliation_string":"C3 Inc., Redwood City, CA, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056686723","display_name":"Pratyay Mukherjee","orcid":"https://orcid.org/0000-0002-0995-9555"},"institutions":[{"id":"https://openalex.org/I4210148469","display_name":"Visa (United States)","ror":"https://ror.org/05t1y0b59","country_code":"US","type":"company","lineage":["https://openalex.org/I4210148469"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pratyay Mukherjee","raw_affiliation_strings":["Visa Research, Palo Alto, CA, USA"],"affiliations":[{"raw_affiliation_string":"Visa Research, Palo Alto, CA, USA","institution_ids":["https://openalex.org/I4210148469"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103181085","display_name":"Rohit Sinha","orcid":"https://orcid.org/0000-0001-9107-0239"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rohit Sinha","raw_affiliation_strings":["Swirlds Inc., Palo Alto, CA, USA"],"affiliations":[{"raw_affiliation_string":"Swirlds Inc., Palo Alto, CA, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5050855162"],"corresponding_institution_ids":["https://openalex.org/I4210148469"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.14409705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2021","issue":null,"first_page":"2758","last_page":"2779"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7271813154220581},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.710017204284668},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.6213304400444031},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5259525775909424},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5255908966064453},{"id":"https://openalex.org/keywords/key-encapsulation","display_name":"Key encapsulation","score":0.5107998847961426},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4947811961174011},{"id":"https://openalex.org/keywords/bilinear-interpolation","display_name":"Bilinear interpolation","score":0.4714796543121338},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4238639175891876},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.4189889430999756},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.41684070229530334},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30855613946914673},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2737736105918884},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22038540244102478},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21856853365898132},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.19845983386039734}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7271813154220581},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.710017204284668},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.6213304400444031},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5259525775909424},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5255908966064453},{"id":"https://openalex.org/C35181327","wikidata":"https://www.wikidata.org/wiki/Q6398156","display_name":"Key encapsulation","level":5,"score":0.5107998847961426},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4947811961174011},{"id":"https://openalex.org/C205203396","wikidata":"https://www.wikidata.org/wiki/Q612143","display_name":"Bilinear interpolation","level":2,"score":0.4714796543121338},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4238639175891876},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.4189889430999756},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.41684070229530334},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30855613946914673},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2737736105918884},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22038540244102478},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21856853365898132},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.19845983386039734},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3460120.3485256","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3485256","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"mag:3204714261","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W7678451","https://openalex.org/W159162986","https://openalex.org/W632399495","https://openalex.org/W1489706603","https://openalex.org/W1524320869","https://openalex.org/W1572695506","https://openalex.org/W1583834646","https://openalex.org/W1596404826","https://openalex.org/W1605426468","https://openalex.org/W1656028867","https://openalex.org/W1752398301","https://openalex.org/W1805062869","https://openalex.org/W1963071371","https://openalex.org/W1981757200","https://openalex.org/W1993060580","https://openalex.org/W2009432965","https://openalex.org/W2147092045","https://openalex.org/W2154059840","https://openalex.org/W2165297797","https://openalex.org/W2398457347","https://openalex.org/W2495842381","https://openalex.org/W2614074621","https://openalex.org/W2621097437","https://openalex.org/W2621220478","https://openalex.org/W2883127957","https://openalex.org/W2912577494","https://openalex.org/W2953067491","https://openalex.org/W2983813777","https://openalex.org/W2989946494","https://openalex.org/W3029882669","https://openalex.org/W3096870392","https://openalex.org/W3097591037","https://openalex.org/W3164824882","https://openalex.org/W6686773509","https://openalex.org/W6728184567","https://openalex.org/W6764294796"],"related_works":["https://openalex.org/W3213644146","https://openalex.org/W2024328459","https://openalex.org/W1986613243","https://openalex.org/W2950633163","https://openalex.org/W3029050384","https://openalex.org/W2891988363","https://openalex.org/W2186591738","https://openalex.org/W2478738560","https://openalex.org/W3089813264","https://openalex.org/W2979952026","https://openalex.org/W2110903266","https://openalex.org/W2950421417","https://openalex.org/W2726996586","https://openalex.org/W2284600470","https://openalex.org/W1806049065","https://openalex.org/W3173153354","https://openalex.org/W3209616419","https://openalex.org/W2952102040","https://openalex.org/W3021419947","https://openalex.org/W2953151355"],"abstract_inverted_index":{"Threshold":[0,32,90],"cryptography":[1],"enables":[2],"cryptographic":[3],"operations":[4],"while":[5],"keeping":[6],"the":[7,52,71,129,212],"secret":[8],"keys":[9,169],"distributed":[10,188],"at":[11],"all":[12],"times.":[13],"Agrawal":[14],"et":[15],"al.":[16],"(CCS'18)":[17],"propose":[18],"a":[19,28,46,76,85,96,106,112,119,141,151,174,187],"framework":[20],"for":[21,54,123],"Distributed":[22],"Symmetric-key":[23,33,91],"Encryption":[24,34,92],"(DiSE).":[25],"They":[26],"introduce":[27],"new":[29,77,86,152],"notion":[30,87,117],"of":[31,49,109,190,202],"(TSE),":[35],"in":[36,170,173,225],"that":[37,154],"encryption":[38],"and":[39,68,133,196,221],"decryption":[40],"are":[41],"performed":[42],"by":[43,83,194],"interacting":[44],"with":[45,138],"threshold":[47,159,175],"number":[48],"servers.":[50,72],"However,":[51],"necessity":[53],"interaction":[55],"on":[56,70,150,186],"each":[57,125],"invocation":[58],"limits":[59],"performance":[60],"when":[61],"encrypting":[62],"large":[63,107],"datasets,":[64],"incurring":[65],"heavy":[66],"computation":[67],"communication":[69],"This":[73],"paper":[74],"proposes":[75],"approach":[78],"to":[79,101,104,121,140,165,211],"resolve":[80],"this":[81],"problem":[82],"introducing":[84],"called":[88],"Amortized":[89],"(ATSE),":[93],"which":[94,162,180],"allows":[95,163],"privileged":[97],"client":[98,120],"(with":[99],"access":[100],"sensitive":[102],"data)":[103],"encrypt":[105],"group":[108],"messages":[110],"using":[111],"single":[113],"interaction.":[114,214],"Importantly,":[115],"our":[116,200,205],"requires":[118],"interact":[122],"decrypting":[124],"ciphertext,":[126],"thus":[127],"providing":[128],"same":[130],"security":[131],"(privacy":[132],"authenticity)":[134],"guarantee":[135],"as":[136,157],"DiSE":[137],"respect":[139],"not-so-privileged":[142],"client.":[143],"We":[144],"construct":[145],"an":[146],"ATSE":[147],"scheme":[148,206],"based":[149,185],"primitive":[153],"we":[155],"formalize":[156],"flexible":[158],"key-derivation":[160],"(FTKD),":[161],"parties":[164],"interactively":[166],"derive":[167],"pseudorandom":[168],"different":[171],"modes":[172],"manner.":[176],"Our":[177,215],"FTKD":[178],"construction,":[179],"uses":[181],"bilinear":[182,203],"pairings,":[183],"is":[184],"variant":[189],"left/right":[191],"constrained":[192],"PRF":[193],"Boneh":[195],"Waters":[197],"(Asiacrypt'13).":[198],"Despite":[199],"use":[201],"maps,":[204],"achieves":[207],"significant":[208],"speed-ups":[209],"due":[210],"amortized":[213],"experiments":[216],"show":[217],"40x":[218],"lower":[219],"latency":[220],"30x":[222],"more":[223],"throughput":[224],"some":[226],"settings.":[227]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
