{"id":"https://openalex.org/W4416549195","doi":"https://doi.org/10.1145/3719027.3765050","title":"Correlation-Aware Secure Sorting and Permutation for Iterative Two-Party Graph Analysis","display_name":"Correlation-Aware Secure Sorting and Permutation for Iterative Two-Party Graph Analysis","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549195","doi":"https://doi.org/10.1145/3719027.3765050"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765050","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765050","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3719027.3765050","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023612588","display_name":"Yunyi Chen","orcid":"https://orcid.org/0009-0002-0279-0539"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yunyi Chen","raw_affiliation_strings":["Tsinghua University, Beijing, China and Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Ant Group, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055665761","display_name":"Jiping Yu","orcid":"https://orcid.org/0000-0002-6643-4405"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiping Yu","raw_affiliation_strings":["Tsinghua University, Beijing, China and Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Ant Group, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100444482","display_name":"Kun Chen","orcid":"https://orcid.org/0000-0003-2370-5372"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kun Chen","raw_affiliation_strings":["Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Beijing, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090111312","display_name":"Xiaoyu Fan","orcid":"https://orcid.org/0000-0001-6962-643X"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyu Fan","raw_affiliation_strings":["Tsinghua University, Beijing, China and Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Tsinghua University, Beijing, China and Ant Group, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101574083","display_name":"Xiaowei Zhu","orcid":"https://orcid.org/0000-0003-3880-308X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xiaowei Zhu","raw_affiliation_strings":["Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, Beijing, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103141832","display_name":"Wenguang Chen","orcid":"https://orcid.org/0000-0002-4281-1018"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenguang Chen","raw_affiliation_strings":["Department of Computer Science and SIGS, Tsinghua University, Bejing and Shenzhen, China and Ant Group, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and SIGS, Tsinghua University, Bejing and Shenzhen, China and Ant Group, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5023612588"],"corresponding_institution_ids":["https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19269855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"3679","last_page":"3693"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.3086000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.3086000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.19089999794960022,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11273","display_name":"Advanced Graph Neural Networks","score":0.14010000228881836,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shuffling","display_name":"Shuffling","score":0.7828999757766724},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5638999938964844},{"id":"https://openalex.org/keywords/permutation","display_name":"Permutation (music)","score":0.4830999970436096},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4674000144004822},{"id":"https://openalex.org/keywords/sorting","display_name":"Sorting","score":0.438400000333786},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.43639999628067017},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4214000105857849},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.41780000925064087}],"concepts":[{"id":"https://openalex.org/C167927819","wikidata":"https://www.wikidata.org/wiki/Q1930567","display_name":"Shuffling","level":2,"score":0.7828999757766724},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6685000061988831},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.6083999872207642},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5638999938964844},{"id":"https://openalex.org/C21308566","wikidata":"https://www.wikidata.org/wiki/Q7169365","display_name":"Permutation (music)","level":2,"score":0.4830999970436096},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4674000144004822},{"id":"https://openalex.org/C111696304","wikidata":"https://www.wikidata.org/wiki/Q2303697","display_name":"Sorting","level":2,"score":0.438400000333786},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.43639999628067017},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4214000105857849},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.41780000925064087},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3790000081062317},{"id":"https://openalex.org/C2779231336","wikidata":"https://www.wikidata.org/wiki/Q7534724","display_name":"Sketch","level":2,"score":0.3635999858379364},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.33309999108314514},{"id":"https://openalex.org/C168297262","wikidata":"https://www.wikidata.org/wiki/Q6031182","display_name":"Information protection policy","level":2,"score":0.32659998536109924},{"id":"https://openalex.org/C88230418","wikidata":"https://www.wikidata.org/wiki/Q131476","display_name":"Graph theory","level":2,"score":0.32030001282691956},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3052999973297119},{"id":"https://openalex.org/C176032523","wikidata":"https://www.wikidata.org/wiki/Q753127","display_name":"Topological sorting","level":3,"score":0.2824999988079071},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C18555067","wikidata":"https://www.wikidata.org/wiki/Q8375051","display_name":"Joint (building)","level":2,"score":0.27379998564720154},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.265500009059906},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26499998569488525},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.2632000148296356},{"id":"https://openalex.org/C146380142","wikidata":"https://www.wikidata.org/wiki/Q1137726","display_name":"Directed graph","level":2,"score":0.26019999384880066},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.2529999911785126}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765050","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765050","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765050","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765050","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W44936433","https://openalex.org/W173953576","https://openalex.org/W780859780","https://openalex.org/W1493343761","https://openalex.org/W1575844567","https://openalex.org/W1608459536","https://openalex.org/W1969009977","https://openalex.org/W1971421925","https://openalex.org/W1977556410","https://openalex.org/W1982146060","https://openalex.org/W1996068512","https://openalex.org/W1997310315","https://openalex.org/W1997859100","https://openalex.org/W2001431291","https://openalex.org/W2011849452","https://openalex.org/W2016267457","https://openalex.org/W2019891719","https://openalex.org/W2038570785","https://openalex.org/W2039605106","https://openalex.org/W2066636486","https://openalex.org/W2088492763","https://openalex.org/W2117362057","https://openalex.org/W2131681506","https://openalex.org/W2134340933","https://openalex.org/W2136451165","https://openalex.org/W2137135938","https://openalex.org/W2150871235","https://openalex.org/W2233456153","https://openalex.org/W2534243026","https://openalex.org/W2891311364","https://openalex.org/W2944600096","https://openalex.org/W2945138318","https://openalex.org/W3003749448","https://openalex.org/W3015391291","https://openalex.org/W3096990751","https://openalex.org/W3111157675","https://openalex.org/W3168851959","https://openalex.org/W3214260160","https://openalex.org/W4292970446","https://openalex.org/W4312935561","https://openalex.org/W4367663126","https://openalex.org/W4389315092","https://openalex.org/W4405182813","https://openalex.org/W4413968243"],"related_works":[],"abstract_inverted_index":{"Secure":[0],"multi-party":[1],"computation":[2],"techniques":[3],"enable":[4],"in-depth":[5],"analysis":[6],"on":[7],"joint":[8],"graphs":[9],"that":[10],"inherently":[11],"encompass":[12],"comprehensive":[13],"topology":[14],"information":[15],"and":[16],"extended":[17],"attributes,":[18],"while":[19],"preserving":[20],"data":[21],"privacy.":[22],"In":[23],"the":[24],"two-party":[25],"setting,":[26],"existing":[27],"approaches":[28],"suffer":[29],"from":[30],"inefficiencies":[31],"due":[32],"to":[33],"redundant":[34],"secure":[35,39,44],"sorting":[36],"or":[37,59],"costly":[38],"shuffling":[40],"operations":[41],"required":[42],"for":[43],"message":[45],"passing.":[46],"Some":[47],"works":[48],"improve":[49],"efficiency":[50],"by":[51,60],"relaxing":[52],"security":[53],"assumptions,":[54],"either":[55],"through":[56],"differential":[57],"privacy":[58],"introducing":[61],"helper":[62],"parties.":[63]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-23T00:00:00"}
