{"id":"https://openalex.org/W4405182018","doi":"https://doi.org/10.1145/3658644.3690204","title":"Leakage-Resilient Circuit Garbling","display_name":"Leakage-Resilient Circuit Garbling","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405182018","doi":"https://doi.org/10.1145/3658644.3690204"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690204","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690204","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690204","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690204","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029256226","display_name":"R. H. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ruiyang Li","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108870456","display_name":"Y. Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiteng Sun","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062882585","display_name":"Chun Guo","orcid":"https://orcid.org/0000-0002-8520-6301"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chun Guo","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070542865","display_name":"Fran\u00e7ois\u2010Xavier Standaert","orcid":"https://orcid.org/0000-0001-7444-0285"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fran\u00e7ois-Xavier Standaert","raw_affiliation_strings":["ICTEAM/ELEN/Crypto Group, UCL, Louvain-la-Neuve, Belgium"],"affiliations":[{"raw_affiliation_string":"ICTEAM/ELEN/Crypto Group, UCL, Louvain-la-Neuve, Belgium","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100460456","display_name":"Weijia Wang","orcid":"https://orcid.org/0000-0001-6982-2537"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weijia Wang","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077754703","display_name":"Xiao Wang","orcid":"https://orcid.org/0000-0002-5991-7417"},"institutions":[{"id":"https://openalex.org/I111979921","display_name":"Northwestern University","ror":"https://ror.org/000e0be47","country_code":"US","type":"education","lineage":["https://openalex.org/I111979921"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiao Wang","raw_affiliation_strings":["Northwestern University, Evanston, USA"],"affiliations":[{"raw_affiliation_string":"Northwestern University, Evanston, USA","institution_ids":["https://openalex.org/I111979921"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5029256226"],"corresponding_institution_ids":["https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.7144,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.77732897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"780","last_page":"794"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6824061274528503},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.6192975044250488},{"id":"https://openalex.org/keywords/side-channel-attack","display_name":"Side channel attack","score":0.4907706677913666},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.4309000074863434},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3179618716239929},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2605031728744507},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24354740977287292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6824061274528503},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.6192975044250488},{"id":"https://openalex.org/C49289754","wikidata":"https://www.wikidata.org/wiki/Q2267081","display_name":"Side channel attack","level":3,"score":0.4907706677913666},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.4309000074863434},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3179618716239929},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2605031728744507},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24354740977287292},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3658644.3690204","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690204","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690204","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},{"id":"pmh:oai:dial.uclouvain.be:boreal:306063","is_oa":true,"landing_page_url":"http://hdl.handle.net/2078.1/306063","pdf_url":null,"source":{"id":"https://openalex.org/S4306400166","display_name":"Digital Access to Libraries","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800384882","host_organization_name":"Harris County Public Library","host_organization_lineage":["https://openalex.org/I2800384882"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, p. 780-794","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690204","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690204","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690204","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1329855610","display_name":null,"funder_award_id":"project","funder_id":"https://openalex.org/F4320321390","funder_display_name":"Fonds De La Recherche Scientifique - FNRS"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2324555706","display_name":null,"funder_award_id":"62372273","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2495752485","display_name":null,"funder_award_id":"2022YFA","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2802911279","display_name":null,"funder_award_id":"Young","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3179399891","display_name":null,"funder_award_id":"101070627","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3608515069","display_name":null,"funder_award_id":"62372274","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5210746403","display_name":"Biomolecular investigation on archaeological grape seeds: a genetic time capsule from the past","funder_award_id":"237227","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5641042146","display_name":"Connecting Symmetric and Asymmetric  Cryptography for Leakage and Faults","funder_award_id":"101096871","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8051717526","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8318064016","display_name":null,"funder_award_id":"Horizon","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G8377584638","display_name":null,"funder_award_id":"2022YFA1004900","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G885663608","display_name":null,"funder_award_id":"senior","funder_id":"https://openalex.org/F4320321390","funder_display_name":"Fonds De La Recherche Scientifique - FNRS"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321390","display_name":"Fonds De La Recherche Scientifique - FNRS","ror":"https://ror.org/03q83t159"},{"id":"https://openalex.org/F4320334322","display_name":"HORIZON EUROPE Framework Programme","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405182018.pdf","grobid_xml":"https://content.openalex.org/works/W4405182018.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W1572026319","https://openalex.org/W1573157032","https://openalex.org/W1897761346","https://openalex.org/W2040168265","https://openalex.org/W2061496435","https://openalex.org/W2088492763","https://openalex.org/W2133701468","https://openalex.org/W2134340933","https://openalex.org/W2167208487","https://openalex.org/W2167606175","https://openalex.org/W2170696315","https://openalex.org/W2398157180","https://openalex.org/W2486054928","https://openalex.org/W2570230384","https://openalex.org/W2613550625","https://openalex.org/W2621670670","https://openalex.org/W2892199772","https://openalex.org/W2982306228","https://openalex.org/W3153001680","https://openalex.org/W4254214383"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W4323824501","https://openalex.org/W2355552010","https://openalex.org/W2136687465","https://openalex.org/W2390279801","https://openalex.org/W3016859066","https://openalex.org/W2159609636","https://openalex.org/W3196561854"],"abstract_inverted_index":{"Due":[0],"to":[1,16,25,94],"the":[2,9,35,47,65,75,104,110,144,157],"ubiquitous":[3],"requirements":[4],"and":[5,19,31,34,69,78,88,98,118],"performance":[6],"leap":[7],"in":[8,22,46],"past":[10],"decade,":[11],"it":[12],"has":[13],"become":[14],"feasible":[15],"execute":[17],"garbling":[18,76,86,112,146,153],"secure":[20],"computations":[21],"settings":[23],"sensitive":[24],"side-channel":[26,91,150],"attacks,":[27],"including":[28],"smartphones,":[29],"IoTs":[30],"dedicated":[32],"hardwares,":[33],"possibilities":[36],"have":[37],"been":[38],"demonstrated":[39],"by":[40],"recent":[41],"works.":[42],"To":[43],"maintain":[44],"security":[45],"presence":[48],"of":[49,53,74,106,114],"a":[50,120],"moderate":[51],"amount":[52],"leaked":[54],"information":[55],"about":[56],"internal":[57],"secrets,":[58],"we":[59],"investigate":[60],"leakage-resilient":[61],"garbling.":[62],"We":[63,83,101],"augment":[64],"classical":[66],"privacy,":[67],"obliviousness":[68],"authenticity":[70],"notions":[71],"with":[72,147],"leakages":[73],"function,":[77],"define":[79],"their":[80],"leakage-resilience":[81,127],"analogues.":[82],"examine":[84],"popular":[85],"schemes":[87],"unveil":[89],"additional":[90],"weaknesses":[92],"due":[93],"wire":[95],"label":[96,107],"reuse":[97],"XOR":[99],"leakages.":[100],"then":[102],"incorporate":[103],"idea":[105],"refreshing":[108],"into":[109],"GLNP":[111],"scheme":[113],"Gueron":[115],"et":[116],"al.":[117],"propose":[119],"variant":[121],"GLNPLR":[122,133],"that":[123,132],"provably":[124],"satisfies":[125],"our":[126],"definitions.":[128],"Performance":[129],"comparison":[130],"indicates":[131],"is":[134,159],"60X":[135],"(using":[136],"AES-NI)":[137,141],"or":[138],"5X":[139],"(without":[140],"faster":[142],"than":[143],"HalfGates":[145],"second":[148],"order":[149],"masking,":[151],"for":[152],"AES":[154],"circuit":[155],"when":[156],"bandwidth":[158],"2Gbps.":[160]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
