{"id":"https://openalex.org/W4388858347","doi":"https://doi.org/10.1145/3576915.3623064","title":"Fast Unbalanced Private Set Union from Fully Homomorphic Encryption","display_name":"Fast Unbalanced Private Set Union from Fully Homomorphic Encryption","publication_year":2023,"publication_date":"2023-11-15","ids":{"openalex":"https://openalex.org/W4388858347","doi":"https://doi.org/10.1145/3576915.3623064"},"language":"en","primary_location":{"id":"doi:10.1145/3576915.3623064","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3623064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005971063","display_name":"Binbin Tu","orcid":"https://orcid.org/0000-0002-2167-0762"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Binbin Tu","raw_affiliation_strings":["Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402120","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-2553-1281"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Chen","raw_affiliation_strings":["Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092518210","display_name":"Qi Liu","orcid":"https://orcid.org/0009-0002-4562-5082"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Liu","raw_affiliation_strings":["Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100438418","display_name":"Cong Zhang","orcid":"https://orcid.org/0009-0000-5403-2866"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Cong Zhang","raw_affiliation_strings":["IIE, CAS, Beijing, China"],"affiliations":[{"raw_affiliation_string":"IIE, CAS, Beijing, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5005971063"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":1.9231,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88972791,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"2959","last_page":"2973"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.939018964767456},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.7530206441879272},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7188378572463989},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.47831037640571594},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.42281997203826904},{"id":"https://openalex.org/keywords/european-union","display_name":"European union","score":0.4130338728427887},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.37447211146354675},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.0937030017375946},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08797228336334229}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.939018964767456},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.7530206441879272},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7188378572463989},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.47831037640571594},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42281997203826904},{"id":"https://openalex.org/C2910001868","wikidata":"https://www.wikidata.org/wiki/Q458","display_name":"European union","level":2,"score":0.4130338728427887},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.37447211146354675},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0937030017375946},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08797228336334229},{"id":"https://openalex.org/C105639569","wikidata":"https://www.wikidata.org/wiki/Q582577","display_name":"Economic policy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3576915.3623064","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3576915.3623064","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.49000000953674316,"id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G5497752695","display_name":null,"funder_award_id":"2021YFA1000600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G5887214946","display_name":null,"funder_award_id":"62272269; 61932019","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W84835382","https://openalex.org/W1874619058","https://openalex.org/W1966731635","https://openalex.org/W2004957971","https://openalex.org/W2013623332","https://openalex.org/W2019891719","https://openalex.org/W2048541619","https://openalex.org/W2110441888","https://openalex.org/W2143824669","https://openalex.org/W2152926062","https://openalex.org/W2519249189","https://openalex.org/W2585287165","https://openalex.org/W2585574365","https://openalex.org/W2612145958","https://openalex.org/W2765239305","https://openalex.org/W2766393794","https://openalex.org/W2767023267","https://openalex.org/W2782492233","https://openalex.org/W2889629344","https://openalex.org/W2922077514","https://openalex.org/W2991526022","https://openalex.org/W3164295456","https://openalex.org/W3211947246","https://openalex.org/W4231916799","https://openalex.org/W4247950230"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4401752887","https://openalex.org/W2625655658","https://openalex.org/W2155069045"],"abstract_inverted_index":{"Private":[0],"set":[1],"union":[2,10],"(PSU)":[3],"allows":[4],"two":[5],"parties":[6],"to":[7],"compute":[8],"the":[9,36,52,55,66],"of":[11,54],"their":[12,45],"sets":[13],"without":[14],"revealing":[15],"anything":[16],"else.":[17],"It":[18],"has":[19],"been":[20,33],"widely":[21],"used":[22],"in":[23,44,65],"various":[24],"applications.":[25],"While":[26],"several":[27],"computationally":[28],"efficient":[29],"PSU":[30,64],"protocols":[31],"have":[32,40],"developed":[34],"for":[35],"balanced":[37],"case,":[38],"they":[39],"a":[41,60,73,77,83,87],"potential":[42],"limitation":[43],"communication":[46],"complexity,":[47],"which":[48],"grows":[49],"(super)-linearly":[50],"with":[51],"size":[53],"larger":[56],"set.":[57,89],"This":[58],"poses":[59],"challenge":[61],"when":[62],"performing":[63],"unbalanced":[67],"setting,":[68],"where":[69],"one":[70],"party":[71],"is":[72,82],"constrained":[74],"device":[75],"holding":[76,86],"small":[78],"set,":[79],"and":[80],"another":[81],"service":[84],"provider":[85],"large":[88]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
