{"id":"https://openalex.org/W4399253990","doi":"https://doi.org/10.1145/3661638.3661692","title":"Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices","display_name":"Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices","publication_year":2023,"publication_date":"2023-12-22","ids":{"openalex":"https://openalex.org/W4399253990","doi":"https://doi.org/10.1145/3661638.3661692"},"language":"en","primary_location":{"id":"doi:10.1145/3661638.3661692","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3661638.3661692","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060556727","display_name":"Yichen Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yichen Bao","raw_affiliation_strings":["Shanghai Maritime University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Maritime University, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084718593","display_name":"Lifei Wei","orcid":"https://orcid.org/0000-0002-0243-9995"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lifei Wei","raw_affiliation_strings":["Shanghai Maritime University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Maritime University, China","institution_ids":["https://openalex.org/I96733725"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101744803","display_name":"Dezhi Han","orcid":"https://orcid.org/0000-0001-8861-5461"},"institutions":[{"id":"https://openalex.org/I96733725","display_name":"Shanghai Maritime University","ror":"https://ror.org/04z7qrj66","country_code":"CN","type":"education","lineage":["https://openalex.org/I96733725"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dezhi Han","raw_affiliation_strings":["Shanghai Maritime University, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Maritime University, China","institution_ids":["https://openalex.org/I96733725"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5060556727"],"corresponding_institution_ids":["https://openalex.org/I96733725"],"apc_list":null,"apc_paid":null,"fwci":0.1961,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.60829996,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"283","last_page":"290"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7983440160751343},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.6266167163848877},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5717007517814636},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5180470943450928},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5072652697563171},{"id":"https://openalex.org/keywords/set-operations","display_name":"Set operations","score":0.5017616748809814},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4614964425563812},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4611961841583252},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.46052086353302},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.430025577545166},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4116080701351166},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.40038686990737915},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.39503252506256104},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.39482447504997253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7983440160751343},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.6266167163848877},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5717007517814636},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5180470943450928},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5072652697563171},{"id":"https://openalex.org/C2777168461","wikidata":"https://www.wikidata.org/wiki/Q42196253","display_name":"Set operations","level":3,"score":0.5017616748809814},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4614964425563812},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4611961841583252},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.46052086353302},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.430025577545166},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4116080701351166},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.40038686990737915},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39503252506256104},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.39482447504997253},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3661638.3661692","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3661638.3661692","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4300000071525574,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W955100975","https://openalex.org/W1499934958","https://openalex.org/W2110441888","https://openalex.org/W2117362057","https://openalex.org/W2138941041","https://openalex.org/W2535199873","https://openalex.org/W2782492233","https://openalex.org/W2821751932","https://openalex.org/W2886749279","https://openalex.org/W2887239198","https://openalex.org/W3013638630","https://openalex.org/W3150904314","https://openalex.org/W3159152443","https://openalex.org/W3205525295","https://openalex.org/W4255390010"],"related_works":["https://openalex.org/W2152299064","https://openalex.org/W2951391113","https://openalex.org/W103476166","https://openalex.org/W2157405322","https://openalex.org/W2950947249","https://openalex.org/W2607424942","https://openalex.org/W171187529","https://openalex.org/W3107025626","https://openalex.org/W3030464122","https://openalex.org/W3172294883"],"abstract_inverted_index":{"In":[0,137,230,257],"the":[1,42,49,54,73,77,105,112,131,165,170,183,186,197,214,222,231,237,251,258,264,280],"IoT":[2,15,50,82,113],"environment,":[3],"a":[4,139,158,203],"large":[5],"amount":[6],"of":[7,41,81,86,107,133,185,196,213,250],"sensitive":[8,29],"data":[9,22,30,83],"are":[10],"transmitted":[11],"and":[12,23,63,79,162,244,272],"processed":[13],"by":[14],"devices,":[16],"such":[17],"as":[18],"personal":[19],"identity,":[20],"location":[21],"health":[24],"data.":[25],"To":[26],"protect":[27],"these":[28],"from":[31],"leakage,":[32],"multi-party":[33,44,117,140,232,259],"private":[34,57,69,141,233,260],"set":[35,119,142,187,234,261],"operation":[36,143],"(MPSO)":[37],"has":[38,240],"become":[39],"one":[40],"important":[43],"secure":[45,61],"computing":[46],"techniques":[47],"in":[48,157,268],"domain,":[51],"which":[52,102,276],"allows":[53,76],"parties":[55],"with":[56,91,98],"sets":[58],"to":[59,125,129,151,163,168],"perform":[60],"intersection":[62,175,188,235],"union":[64,177,262],"operations":[65],"respectively":[66],"without":[67,189],"disclosing":[68],"information":[70],"other":[71],"than":[72,248,279],"results.":[74,173],"It":[75],"exchange":[78],"share":[80],"effectively.":[84],"Most":[85],"them":[87],"use":[88],"homomorphic":[89],"encryption":[90],"expensive":[92,99],"computational":[93,246],"overhead":[94,154],"or":[95,176],"oblivious":[96],"transfer":[97],"communication":[100,156,242,274],"costs,":[101],"can":[103],"affect":[104],"performance":[106],"practical":[108],"applications,":[109],"especially":[110],"for":[111,155,254],"devices.":[114],"A":[115],"new":[116],"multi-query":[118],"membership":[120],"testing":[121],"component":[122,150],"is":[123,145,179,200,209,220,277],"designed":[124],"allow":[126],"multiple":[127],"participants":[128],"compute":[130],"differences":[132],"their":[134],"own":[135],"datasets.":[136],"addition,":[138],"protocol":[144,199,239,266],"constructed":[146,198],"based":[147],"on":[148,226],"this":[149],"achieve":[152],"minimal":[153],"star":[159],"network":[160],"topology,":[161],"designate":[164],"central":[166],"party":[167],"obtain":[169],"final":[171],"computation":[172],"The":[174,194,206,218],"results":[178],"computed":[180],"while":[181],"obtaining":[182],"cardinality":[184],"revealing":[190],"any":[191],"additional":[192],"information.":[193],"security":[195],"proved":[201],"under":[202],"semi-honest":[204],"model.":[205],"proposed":[207,238,265],"framework":[208],"an":[210],"efficient":[211],"extension":[212],"existing":[215,252,281],"work":[216,253],"mqRPMT.":[217],"experiment":[219],"using":[221],"elliptic":[223],"curve":[224],"curve25519":[225],"ECDH":[227],"key":[228],"negotiation.":[229],"protocol,":[236,263],"fewer":[241],"rounds":[243],"higher":[245],"efficiency":[247],"those":[249],"small":[255],"sets.":[256],"runs":[267],"O(nlogn)":[269],"time":[270],"complexity":[271],"constant":[273],"rounds,":[275],"better":[278],"work.":[282]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
