{"id":"https://openalex.org/W4395690223","doi":"https://doi.org/10.1145/3603287.3651188","title":"Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy","display_name":"Privacy-Preserving Gross Domestic Product (GDP) Calculation Using Paillier Encryption and Differential Privacy","publication_year":2024,"publication_date":"2024-04-18","ids":{"openalex":"https://openalex.org/W4395690223","doi":"https://doi.org/10.1145/3603287.3651188"},"language":"en","primary_location":{"id":"doi:10.1145/3603287.3651188","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603287.3651188","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603287.3651188","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Southeast Conference on ZZZ","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3603287.3651188","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027004171","display_name":"Sanjaikanth E Vadakkethil Somanathan Pillai","orcid":"https://orcid.org/0000-0003-3264-9923"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sanjaikanth E. Vadakkethil Somanathan Pillai","raw_affiliation_strings":["University of North Dakota, Grand Forks, North Dakota, USA"],"raw_orcid":"https://orcid.org/0000-0003-3264-9923","affiliations":[{"raw_affiliation_string":"University of North Dakota, Grand Forks, North Dakota, USA","institution_ids":["https://openalex.org/I24571045"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5009209064","display_name":"Wen-Chen Hu","orcid":"https://orcid.org/0000-0003-3748-3280"},"institutions":[{"id":"https://openalex.org/I24571045","display_name":"University of North Dakota","ror":"https://ror.org/04a5szx83","country_code":"US","type":"education","lineage":["https://openalex.org/I24571045"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wen-Chen Hu","raw_affiliation_strings":["University of North Dakota, Grand Forks, North Dakota, USA"],"raw_orcid":"https://orcid.org/0000-0003-3748-3280","affiliations":[{"raw_affiliation_string":"University of North Dakota, Grand Forks, North Dakota, USA","institution_ids":["https://openalex.org/I24571045"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027004171"],"corresponding_institution_ids":["https://openalex.org/I24571045"],"apc_list":null,"apc_paid":null,"fwci":0.3311,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.61814435,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"182","last_page":"187"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9866999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.9854999780654907,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/differential-privacy","display_name":"Differential privacy","score":0.8134554624557495},{"id":"https://openalex.org/keywords/gross-domestic-product","display_name":"Gross domestic product","score":0.8078794479370117},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6949295997619629},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5432875752449036},{"id":"https://openalex.org/keywords/safeguarding","display_name":"Safeguarding","score":0.5305091738700867},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4738997519016266},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.44024011492729187},{"id":"https://openalex.org/keywords/goods-and-services","display_name":"Goods and services","score":0.43772631883621216},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.4196022152900696},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35498708486557007},{"id":"https://openalex.org/keywords/econometrics","display_name":"Econometrics","score":0.35157451033592224},{"id":"https://openalex.org/keywords/economics","display_name":"Economics","score":0.28667932748794556},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.22199666500091553},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14853405952453613},{"id":"https://openalex.org/keywords/macroeconomics","display_name":"Macroeconomics","score":0.12204009294509888},{"id":"https://openalex.org/keywords/economy","display_name":"Economy","score":0.10742497444152832},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.1031104326248169}],"concepts":[{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.8134554624557495},{"id":"https://openalex.org/C114350782","wikidata":"https://www.wikidata.org/wiki/Q12638","display_name":"Gross domestic product","level":2,"score":0.8078794479370117},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6949295997619629},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5432875752449036},{"id":"https://openalex.org/C2776743756","wikidata":"https://www.wikidata.org/wiki/Q5097921","display_name":"Safeguarding","level":2,"score":0.5305091738700867},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4738997519016266},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.44024011492729187},{"id":"https://openalex.org/C187452473","wikidata":"https://www.wikidata.org/wiki/Q2897903","display_name":"Goods and services","level":2,"score":0.43772631883621216},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.4196022152900696},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35498708486557007},{"id":"https://openalex.org/C149782125","wikidata":"https://www.wikidata.org/wiki/Q160039","display_name":"Econometrics","level":1,"score":0.35157451033592224},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.28667932748794556},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.22199666500091553},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14853405952453613},{"id":"https://openalex.org/C139719470","wikidata":"https://www.wikidata.org/wiki/Q39680","display_name":"Macroeconomics","level":1,"score":0.12204009294509888},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.10742497444152832},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.1031104326248169},{"id":"https://openalex.org/C159110408","wikidata":"https://www.wikidata.org/wiki/Q121176","display_name":"Nursing","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3603287.3651188","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603287.3651188","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603287.3651188","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Southeast Conference on ZZZ","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3603287.3651188","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3603287.3651188","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3603287.3651188","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 ACM Southeast Conference on ZZZ","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4395690223.pdf"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W2473418344","https://openalex.org/W2911978475","https://openalex.org/W2978348882","https://openalex.org/W3016632787","https://openalex.org/W3090949167","https://openalex.org/W3126033163","https://openalex.org/W3216512885","https://openalex.org/W6824583106"],"related_works":["https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W1531601525","https://openalex.org/W2886003132","https://openalex.org/W4313042257","https://openalex.org/W4378386719","https://openalex.org/W4384941016","https://openalex.org/W2969200222","https://openalex.org/W4210487772","https://openalex.org/W4386839770"],"abstract_inverted_index":{"Gross":[0],"Domestic":[1],"Product":[2],"(GDP)":[3],"is":[4,25,29,128],"the":[5,58,82,90,99,116,131],"total":[6],"value":[7],"of":[8,19,61,84,101],"goods":[9],"and":[10,28,54,110,121,137],"services":[11],"provided":[12],"by":[13,32],"a":[14,17],"country":[15],"for":[16,43],"period":[18],"time":[20],"like":[21],"one":[22],"year.":[23],"It":[24,93],"well":[26],"known":[27],"widely":[30],"used":[31,42],"most":[33],"countries":[34],"to":[35,64,72,97,134],"measure":[36],"their":[37],"economy.":[38],"Various":[39],"methodologies":[40,63],"are":[41,119],"GDP":[44,67,85,136],"computation":[45],"including":[46],"three":[47],"major":[48],"approaches:":[49],"(i)":[50],"production,":[51],"(ii)":[52],"expenditure,":[53],"(iii)":[55],"income.":[56],"However,":[57],"practical":[59],"application":[60],"these":[62],"actual":[65],"country-level":[66],"assessment":[68],"remains":[69],"unsatisfied":[70],"due":[71],"inherent":[73],"limitations":[74],"in":[75,103],"accessing":[76],"individual-level":[77],"data.":[78],"This":[79,126],"paper":[80],"studies":[81],"intricacies":[83],"calculation,":[86],"particularly":[87],"focusing":[88],"on":[89],"income":[91],"approach.":[92],"explores":[94],"innovative":[95],"methods":[96,118],"ensure":[98],"privacy":[100],"participants":[102],"this":[104],"computation,":[105],"presenting":[106],"techniques":[107],"involving":[108],"encryption":[109],"differential":[111],"privacy.":[112,125,143],"Experiment":[113],"results":[114],"show":[115],"proposed":[117],"promising":[120],"strongly":[122],"protect":[123],"individuals'":[124],"endeavor":[127],"groundbreaking,":[129],"marking":[130],"first":[132],"attempt":[133],"calculate":[135],"related":[138],"values":[139],"while":[140],"safeguarding":[141],"contributors'":[142]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-01-25T23:04:38.658462","created_date":"2025-10-10T00:00:00"}
