{"id":"https://openalex.org/W4383221388","doi":"https://doi.org/10.1145/3579856.3582817","title":"PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption","display_name":"PSI with computation or Circuit-PSI for Unbalanced Sets from Homomorphic Encryption","publication_year":2023,"publication_date":"2023-07-05","ids":{"openalex":"https://openalex.org/W4383221388","doi":"https://doi.org/10.1145/3579856.3582817"},"language":"en","primary_location":{"id":"doi:10.1145/3579856.3582817","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064752933","display_name":"Yongha Son","orcid":"https://orcid.org/0000-0003-1394-234X"},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]},{"id":"https://openalex.org/I4387155180","display_name":"Samsung SDS (South Korea)","ror":"https://ror.org/0476bn305","country_code":null,"type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4387155180"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Yongha Son","raw_affiliation_strings":["Samsung SDS, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0003-1394-234X","affiliations":[{"raw_affiliation_string":"Samsung SDS, Republic of Korea","institution_ids":["https://openalex.org/I2250650973","https://openalex.org/I4387155180"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057980212","display_name":"Jinhyuck Jeong","orcid":"https://orcid.org/0000-0002-6785-9835"},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]},{"id":"https://openalex.org/I4387155180","display_name":"Samsung SDS (South Korea)","ror":"https://ror.org/0476bn305","country_code":null,"type":"company","lineage":["https://openalex.org/I2250650973","https://openalex.org/I4387155180"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jinhyuck Jeong","raw_affiliation_strings":["Samsung SDS, Republic of Korea"],"raw_orcid":"https://orcid.org/0000-0002-6785-9835","affiliations":[{"raw_affiliation_string":"Samsung SDS, Republic of Korea","institution_ids":["https://openalex.org/I2250650973","https://openalex.org/I4387155180"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5064752933"],"corresponding_institution_ids":["https://openalex.org/I2250650973","https://openalex.org/I4387155180"],"apc_list":null,"apc_paid":null,"fwci":1.8745,"has_fulltext":false,"cited_by_count":11,"citation_normalized_percentile":{"value":0.88323807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"342","last_page":"356"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.988099992275238,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8582625389099121},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.6929910778999329},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.6347095966339111},{"id":"https://openalex.org/keywords/set-operations","display_name":"Set operations","score":0.6005288362503052},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5741865634918213},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5481019020080566},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5139345526695251},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4912242293357849},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.438870906829834},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4230636656284332},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3935864567756653},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.33038511872291565},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2556565999984741},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15886572003364563},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15816062688827515},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.12394127249717712}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8582625389099121},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.6929910778999329},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.6347095966339111},{"id":"https://openalex.org/C2777168461","wikidata":"https://www.wikidata.org/wiki/Q42196253","display_name":"Set operations","level":3,"score":0.6005288362503052},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5741865634918213},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5481019020080566},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5139345526695251},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4912242293357849},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.438870906829834},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4230636656284332},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3935864567756653},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.33038511872291565},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2556565999984741},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15886572003364563},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15816062688827515},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.12394127249717712},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3579856.3582817","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3579856.3582817","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the ACM Asia Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W173953576","https://openalex.org/W198033559","https://openalex.org/W1577229502","https://openalex.org/W2026179596","https://openalex.org/W2027471022","https://openalex.org/W2071825329","https://openalex.org/W2527617455","https://openalex.org/W2535199873","https://openalex.org/W2765239305","https://openalex.org/W2766393794","https://openalex.org/W2889629344","https://openalex.org/W2922077514","https://openalex.org/W2968964112","https://openalex.org/W3013638630","https://openalex.org/W3046353218","https://openalex.org/W3081681251","https://openalex.org/W3095102583","https://openalex.org/W3159746013","https://openalex.org/W3164295456","https://openalex.org/W3166373439","https://openalex.org/W3183199186","https://openalex.org/W3190233621","https://openalex.org/W3215333078"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W2887779253","https://openalex.org/W2157405322","https://openalex.org/W2950947249","https://openalex.org/W171187529","https://openalex.org/W3107025626","https://openalex.org/W3030464122","https://openalex.org/W3172294883"],"abstract_inverted_index":{"Circuit-based":[0],"Private":[1],"Set":[2],"Intersection":[3],"(circuit-PSI)":[4],"refers":[5],"to":[6,126],"cryptographic":[7],"protocols":[8],"that":[9,100],"let":[10],"two":[11],"parties":[12],"with":[13],"input":[14,46],"set":[15,26,47,63,90,110,122],"X":[16,27],"and":[17,50,56],"Y":[18],"compute":[19],"a":[20],"function":[21],"f":[22],"over":[23],"the":[24,43,74,88,108,120],"intersection":[25],"\u2229":[28],"Y,":[29],"without":[30],"revealing":[31],"any":[32],"other":[33],"information.":[34],"The":[35],"research":[36],"efforts":[37],"for":[38,60,78],"circuit-PSI":[39],"mainly":[40],"focus":[41],"on":[42,107],"case":[44],"where":[45,119],"sizes":[48,64],"|X|":[49,65],"|Y|":[51],"are":[52],"similar":[53],"so":[54],"far,":[55],"they":[57],"scale":[58],"poorly":[59],"extremely":[61],"unbalanced":[62],"\u226b":[66],"|Y|.":[67,92],"Recently,":[68],"Lepoint":[69],"et":[70],"al.":[71],"(ASIACRYPT\u201921)":[72],"proposed":[73],"first":[75],"dedicated":[76],"solutions":[77],"this":[79],"problem,":[80],"which":[81,113],"has":[82],"online":[83],"cost":[84],"only":[85],"linear":[86],"in":[87,117],"small":[89,109,121],"size":[91],"However,":[93],"it":[94],"requires":[95,101],"an":[96],"expensive":[97],"setup":[98],"phase":[99],"huge":[102],"storage":[103],"of":[104],"about":[105],"O(|X|)":[106],"holder":[111,123],"side,":[112],"can":[114],"be":[115],"problematic":[116],"applications":[118],"is":[124],"assumed":[125],"have":[127],"restricted":[128],"equipment.":[129]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
