{"id":"https://openalex.org/W4366544888","doi":"https://doi.org/10.1145/3577923.3583651","title":"Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation","display_name":"Anonymous System for Fully Distributed and Robust Secure Multi-Party Computation","publication_year":2023,"publication_date":"2023-04-20","ids":{"openalex":"https://openalex.org/W4366544888","doi":"https://doi.org/10.1145/3577923.3583651"},"language":"en","primary_location":{"id":"doi:10.1145/3577923.3583651","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577923.3583651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048231919","display_name":"Andreas Klinger","orcid":"https://orcid.org/0000-0002-0896-9110"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Andreas Klinger","raw_affiliation_strings":["RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022922766","display_name":"Felix Battermann","orcid":"https://orcid.org/0000-0001-7547-7012"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Felix Battermann","raw_affiliation_strings":["RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001580305","display_name":"Ulrike Meyer","orcid":"https://orcid.org/0000-0002-2569-1042"},"institutions":[{"id":"https://openalex.org/I887968799","display_name":"RWTH Aachen University","ror":"https://ror.org/04xfq0f34","country_code":"DE","type":"education","lineage":["https://openalex.org/I887968799"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ulrike Meyer","raw_affiliation_strings":["RWTH Aachen University, Aachen, Germany"],"affiliations":[{"raw_affiliation_string":"RWTH Aachen University, Aachen, Germany","institution_ids":["https://openalex.org/I887968799"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5048231919"],"corresponding_institution_ids":["https://openalex.org/I887968799"],"apc_list":null,"apc_paid":null,"fwci":0.1751,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.5206577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"129","last_page":"139"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7556368112564087},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7459801435470581},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.7394925951957703},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7271981835365295},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.682352602481842},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5274063944816589},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.47027164697647095},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.4399165213108063},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.4282674789428711},{"id":"https://openalex.org/keywords/third-party","display_name":"Third party","score":0.42682313919067383},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3233101963996887},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.30230239033699036},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.10083132982254028}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7556368112564087},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7459801435470581},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.7394925951957703},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7271981835365295},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.682352602481842},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5274063944816589},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.47027164697647095},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.4399165213108063},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.4282674789428711},{"id":"https://openalex.org/C2983583741","wikidata":"https://www.wikidata.org/wiki/Q16785388","display_name":"Third party","level":2,"score":0.42682313919067383},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3233101963996887},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.30230239033699036},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.10083132982254028},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3577923.3583651","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3577923.3583651","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5600000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G2757978615","display_name":null,"funder_award_id":"2236/2","funder_id":"https://openalex.org/F4320320879","funder_display_name":"Deutsche Forschungsgemeinschaft"}],"funders":[{"id":"https://openalex.org/F4320320879","display_name":"Deutsche Forschungsgemeinschaft","ror":"https://ror.org/018mejw64"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1655958391","https://openalex.org/W1699769462","https://openalex.org/W2027471022","https://openalex.org/W2039275540","https://openalex.org/W2051810363","https://openalex.org/W2088492763","https://openalex.org/W2595976459","https://openalex.org/W2967873809","https://openalex.org/W3046314104","https://openalex.org/W3128513525","https://openalex.org/W3209265906","https://openalex.org/W4300628769"],"related_works":["https://openalex.org/W2166443687","https://openalex.org/W2260680879","https://openalex.org/W2157432921","https://openalex.org/W2272650572","https://openalex.org/W2552528289","https://openalex.org/W2135434501","https://openalex.org/W134612904","https://openalex.org/W2139391839","https://openalex.org/W2054449208","https://openalex.org/W2280967259"],"abstract_inverted_index":{"In":[0,70,182],"secure":[1,26,131],"multi-party":[2],"computation":[3],"(SMPC),":[4],"it":[5,184],"is":[6],"considered":[7],"that":[8,11,53,93,114,165,186],"multiple":[9],"parties":[10,30,55,116,138,168,193],"are":[12,95,194],"known":[13],"to":[14,78,89,117,139],"each":[15,36,57,174,188],"other":[16,175],"evaluate":[17,119],"a":[18,25,98,120,127,148,155],"function":[19,100,121,189],"over":[20],"their":[21,46,80,123],"private":[22,38,81,124],"inputs":[23,39,82,125],"in":[24,97,102,126,151,187],"fashion.":[27,132],"The":[28,51,133],"participating":[29,96,167,192],"do":[31],"not":[32,61,75],"learn":[33],"anything":[34],"about":[35],"other's":[37],"beyond":[40],"what":[41],"can":[42,200],"be":[43],"deduced":[44],"from":[45],"own":[47],"input":[48],"and":[49,83,130],"output.":[50],"assumption":[52],"the":[54,91,103,152,159,162],"know":[56],"other,":[58],"however,":[59],"does":[60],"seem":[62],"suitable":[63],"for":[64,112],"all":[65,166,191],"potential":[66],"applications":[67,72],"of":[68,122,154],"SMPC.":[69],"some":[71],"participants":[73],"may":[74,86],"only":[76],"want":[77,88],"hide":[79,90],"outputs,":[84],"but":[85],"also":[87],"fact":[92],"they":[94],"given":[99],"evaluation":[101,190],"first":[104],"place.":[105],"We":[106],"therefore":[107],"propose":[108],"an":[109,141],"anonymous":[110,170],"system":[111,135,163],"SMPC":[113,142],"allows":[115,136],"anonymously":[118],"fully":[128],"distributed":[129],"proposed":[134],"authorized":[137],"execute":[140],"protocol":[143,160],"robust":[144],"with":[145],"penalty":[146],"against":[147],"dishonest":[149],"majority":[150],"presence":[153],"malicious":[156],"adversary.":[157],"During":[158],"execution,":[161],"guarantees":[164,185],"stay":[169],"w.":[171],"r.":[172],"t.":[173],"as":[176,178,202],"well":[177],"any":[179],"third":[180],"parties.":[181],"addition,":[183],"unique,":[195],"i.":[196],"e.,":[197],"no":[198],"party":[199],"participate":[201],"more":[203],"than":[204],"one":[205],"entity.":[206]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
