{"id":"https://openalex.org/W4416549292","doi":"https://doi.org/10.1145/3719027.3765225","title":"From OT to OLE with Subquadratic Communication","display_name":"From OT to OLE with Subquadratic Communication","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549292","doi":"https://doi.org/10.1145/3719027.3765225"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765225","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3765225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075332247","display_name":"Jack Doerner","orcid":"https://orcid.org/0009-0007-0409-2132"},"institutions":[{"id":"https://openalex.org/I51556381","display_name":"University of Virginia","ror":"https://ror.org/0153tk833","country_code":"US","type":"education","lineage":["https://openalex.org/I51556381"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jack Doerner","raw_affiliation_strings":["University of Virginia, Charlottesville, USA"],"affiliations":[{"raw_affiliation_string":"University of Virginia, Charlottesville, USA","institution_ids":["https://openalex.org/I51556381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061963231","display_name":"Iftach Haitner","orcid":"https://orcid.org/0000-0003-3167-3294"},"institutions":[{"id":"https://openalex.org/I16391192","display_name":"Tel Aviv University","ror":"https://ror.org/04mhzgx49","country_code":"IL","type":"education","lineage":["https://openalex.org/I16391192"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Iftach Haitner","raw_affiliation_strings":["Stellar Development Foundation, San Francisco, USA and Tel Aviv University, Tel Aviv, Israel"],"affiliations":[{"raw_affiliation_string":"Stellar Development Foundation, San Francisco, USA and Tel Aviv University, Tel Aviv, Israel","institution_ids":["https://openalex.org/I16391192"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081852077","display_name":"Yuval Ishai","orcid":"https://orcid.org/0009-0009-4096-6305"},"institutions":[{"id":"https://openalex.org/I174306211","display_name":"Technion \u2013 Israel Institute of Technology","ror":"https://ror.org/03qryx823","country_code":"IL","type":"education","lineage":["https://openalex.org/I174306211"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yuval Ishai","raw_affiliation_strings":["Technion - Israel Institute of Technology, Haifa, Israel and Amazon Web Services, Inc., Seattle, USA"],"affiliations":[{"raw_affiliation_string":"Technion - Israel Institute of Technology, Haifa, Israel and Amazon Web Services, Inc., Seattle, USA","institution_ids":["https://openalex.org/I174306211"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021052839","display_name":"Nikolaos Makriyannis","orcid":"https://orcid.org/0000-0002-9818-456X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nikolaos Makriyannis","raw_affiliation_strings":["Fireblocks, New York, USA"],"affiliations":[{"raw_affiliation_string":"Fireblocks, New York, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075332247"],"corresponding_institution_ids":["https://openalex.org/I51556381"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.19272819,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2249","last_page":"2263"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9369999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9369999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.013100000098347664,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.008500000461935997,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.7680000066757202},{"id":"https://openalex.org/keywords/generalization","display_name":"Generalization","score":0.6306999921798706},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.5927000045776367},{"id":"https://openalex.org/keywords/oblivious-transfer","display_name":"Oblivious transfer","score":0.5375999808311462},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5174000263214111},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.48579999804496765},{"id":"https://openalex.org/keywords/line","display_name":"Line (geometry)","score":0.43230000138282776},{"id":"https://openalex.org/keywords/algebraic-number","display_name":"Algebraic number","score":0.4153999984264374}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.7680000066757202},{"id":"https://openalex.org/C177148314","wikidata":"https://www.wikidata.org/wiki/Q170084","display_name":"Generalization","level":2,"score":0.6306999921798706},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.5927000045776367},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5922999978065491},{"id":"https://openalex.org/C53076038","wikidata":"https://www.wikidata.org/wiki/Q2915383","display_name":"Oblivious transfer","level":3,"score":0.5375999808311462},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5174000263214111},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.48579999804496765},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.44830000400543213},{"id":"https://openalex.org/C198352243","wikidata":"https://www.wikidata.org/wiki/Q37105","display_name":"Line (geometry)","level":2,"score":0.43230000138282776},{"id":"https://openalex.org/C9376300","wikidata":"https://www.wikidata.org/wiki/Q168817","display_name":"Algebraic number","level":2,"score":0.4153999984264374},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.4027000069618225},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.3995000123977661},{"id":"https://openalex.org/C2776175482","wikidata":"https://www.wikidata.org/wiki/Q1195816","display_name":"Transfer (computing)","level":2,"score":0.3788999915122986},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.34700000286102295},{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.3292999863624573},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3199000060558319},{"id":"https://openalex.org/C75432250","wikidata":"https://www.wikidata.org/wiki/Q29654355","display_name":"Real line","level":2,"score":0.30799999833106995},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.27970001101493835},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.27140000462532043},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.25780001282691956},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2513999938964844},{"id":"https://openalex.org/C174440990","wikidata":"https://www.wikidata.org/wiki/Q681349","display_name":"Point-to-point","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765225","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3719027.3765225","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W87436411","https://openalex.org/W1560201081","https://openalex.org/W1567505539","https://openalex.org/W1977802313","https://openalex.org/W1986725179","https://openalex.org/W1987667503","https://openalex.org/W1996068512","https://openalex.org/W1997859100","https://openalex.org/W2093308874","https://openalex.org/W2127212631","https://openalex.org/W2157314106","https://openalex.org/W2539273492","https://openalex.org/W2728543642","https://openalex.org/W2890219821","https://openalex.org/W2923569601","https://openalex.org/W2933493434","https://openalex.org/W2968538997","https://openalex.org/W2987358745","https://openalex.org/W3021332472","https://openalex.org/W3037429281","https://openalex.org/W3082205386","https://openalex.org/W3095923304","https://openalex.org/W3108205245","https://openalex.org/W3127165609","https://openalex.org/W4285301190","https://openalex.org/W4385405602","https://openalex.org/W4395960892","https://openalex.org/W4404310211","https://openalex.org/W4405279336","https://openalex.org/W4411337886"],"related_works":[],"abstract_inverted_index":{"Oblivious":[0],"Linear":[1],"Evaluation":[2],"(OLE)":[3],"is":[4],"an":[5],"algebraic":[6],"generalization":[7],"of":[8,17,21,72,83],"oblivious":[9],"transfer":[10],"(OT)":[11],"that":[12],"forms":[13],"a":[14,18,27,37,47],"critical":[15],"part":[16],"growing":[19],"number":[20],"applications.":[22],"An":[23],"OLE":[24,59,74],"protocol":[25],"over":[26],"modulus":[28],"q":[29],"enables":[30],"the":[31,43,54,70,80],"receiver":[32],"party":[33,45],"to":[34,75,78],"securely":[35],"evaluate":[36],"line":[38],"a\u22c5":[39],"X+b":[40],"chosen":[41],"by":[42,53,63],"sender":[44],"on":[46],"secret":[48],"point":[49],"x\u2208":[50],"\u2124q.":[51],"Motivated":[52],"big":[55],"efficiency":[56],"gap":[57],"between":[58],"and":[60,62],"OT":[61,65],"fast":[64],"extension":[66],"techniques,":[67],"we":[68],"revisit":[69],"question":[71],"reducing":[73],"OT,":[76],"aiming":[77],"improve":[79],"communication":[81],"cost":[82],"known":[84],"reductions.":[85]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-11-23T00:00:00"}
