{"id":"https://openalex.org/W4416549334","doi":"https://doi.org/10.1145/3719027.3765234","title":"Multi-Party Private Set Operations from Predicative Zero-Sharing","display_name":"Multi-Party Private Set Operations from Predicative Zero-Sharing","publication_year":2025,"publication_date":"2025-11-19","ids":{"openalex":"https://openalex.org/W4416549334","doi":"https://doi.org/10.1145/3719027.3765234"},"language":null,"primary_location":{"id":"doi:10.1145/3719027.3765234","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765234","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765234","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765234","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031691558","display_name":"Minglang Dong","orcid":"https://orcid.org/0009-0002-5323-7119"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Minglang Dong","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China and State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China"],"raw_orcid":"https://orcid.org/0009-0002-5323-7119","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China and State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920","https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402120","display_name":"Yu Chen","orcid":"https://orcid.org/0000-0003-2553-1281"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Chen","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China, State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China, and State Key Laboratory of Cryptology, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0003-2553-1281","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China, State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China, and State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100438418","display_name":"Cong Zhang","orcid":"https://orcid.org/0009-0000-5403-2866"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cong Zhang","raw_affiliation_strings":["Institute for Advanced Study, Tsinghua University, Beijing, China"],"raw_orcid":"https://orcid.org/0009-0000-5403-2866","affiliations":[{"raw_affiliation_string":"Institute for Advanced Study, Tsinghua University, Beijing, China","institution_ids":["https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yujie Bai","orcid":"https://orcid.org/0009-0006-7500-3531"},"institutions":[{"id":"https://openalex.org/I1328775524","display_name":"Zhejiang Sci-Tech University","ror":"https://ror.org/03893we55","country_code":"CN","type":"education","lineage":["https://openalex.org/I1328775524"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yujie Bai","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, China"],"raw_orcid":"https://orcid.org/0009-0006-7500-3531","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China and Hangzhou High-Tech Zone (Binjiang) Institute of Blockchain and Data Security, Hangzhou, China","institution_ids":["https://openalex.org/I1328775524"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yang Cao","orcid":"https://orcid.org/0009-0001-7530-9745"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yang Cao","raw_affiliation_strings":["School of Cyber Science and Technology, Shandong University, Qingdao, China and State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China"],"raw_orcid":"https://orcid.org/0009-0001-7530-9745","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China and State Key Laboratory of Cryptography and Digital Economy Security, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920","https://openalex.org/I4210132990"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5031691558"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I80143920"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18436475,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"4079","last_page":"4093"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.0017000000225380063,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.000699999975040555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/set-operations","display_name":"Set operations","score":0.7754999995231628},{"id":"https://openalex.org/keywords/cardinality","display_name":"Cardinality (data modeling)","score":0.6974999904632568},{"id":"https://openalex.org/keywords/intersection","display_name":"Intersection (aeronautics)","score":0.6844000220298767},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.58160001039505},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5457000136375427},{"id":"https://openalex.org/keywords/generality","display_name":"Generality","score":0.5376999974250793},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4973999857902527},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.362199991941452}],"concepts":[{"id":"https://openalex.org/C2777168461","wikidata":"https://www.wikidata.org/wiki/Q42196253","display_name":"Set operations","level":3,"score":0.7754999995231628},{"id":"https://openalex.org/C87117476","wikidata":"https://www.wikidata.org/wiki/Q362383","display_name":"Cardinality (data modeling)","level":2,"score":0.6974999904632568},{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.6844000220298767},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.58160001039505},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5457000136375427},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5428000092506409},{"id":"https://openalex.org/C2780767217","wikidata":"https://www.wikidata.org/wiki/Q5532421","display_name":"Generality","level":2,"score":0.5376999974250793},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5327000021934509},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4973999857902527},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.353300005197525},{"id":"https://openalex.org/C129131279","wikidata":"https://www.wikidata.org/wiki/Q1931259","display_name":"Predicative expression","level":2,"score":0.3449999988079071},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3183000087738037},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3003999888896942},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.2989000082015991},{"id":"https://openalex.org/C153046414","wikidata":"https://www.wikidata.org/wiki/Q12482","display_name":"Set theory","level":3,"score":0.29789999127388},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.2867000102996826},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2759000062942505},{"id":"https://openalex.org/C102565666","wikidata":"https://www.wikidata.org/wiki/Q1378301","display_name":"Universal set","level":3,"score":0.2736000120639801},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3719027.3765234","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765234","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765234","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3719027.3765234","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3719027.3765234","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3719027.3765234","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7282183672","display_name":null,"funder_award_id":"62272269","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4416549334.pdf","grobid_xml":"https://content.openalex.org/works/W4416549334.grobid-xml"},"referenced_works_count":21,"referenced_works":["https://openalex.org/W1497054113","https://openalex.org/W2023279925","https://openalex.org/W2110441888","https://openalex.org/W2143087446","https://openalex.org/W2143824669","https://openalex.org/W2535199873","https://openalex.org/W2585287165","https://openalex.org/W2794672641","https://openalex.org/W2887239198","https://openalex.org/W2912601938","https://openalex.org/W3150904314","https://openalex.org/W3166373439","https://openalex.org/W3183199186","https://openalex.org/W3205525295","https://openalex.org/W3215333078","https://openalex.org/W4281385049","https://openalex.org/W4308642594","https://openalex.org/W4367665466","https://openalex.org/W4389844017","https://openalex.org/W4393952239","https://openalex.org/W4400382085"],"related_works":[],"abstract_inverted_index":{"Typical":[0],"protocols":[1,235,288],"in":[2,39,51,65,146,216,259],"the":[3,21,127,134,173,186,213,217,222,254,257,264,281],"multi-party":[4,153,195,241],"private":[5,27,107,196,242],"set":[6,88,98,174,197,243],"operations":[7],"(MPSO)":[8],"setting":[9],"enable":[10],"m":[11,78],">":[12],"2":[13],"parties":[14],"to":[15,84,118,137],"perform":[16],"certain":[17],"secure":[18,152],"computation":[19,154,166],"on":[20,43,105,150,183,230],"intersection":[22,198],"or":[23,46,252],"union":[24,102,244],"of":[25,34,55,61,92,96,123,129,142,224,256,267,283,286,297],"their":[26,106],"sets,":[28],"realizing":[29],"a":[30,52,59,62,82,93,120,140,271,284],"very":[31],"limited":[32],"range":[33],"MPSO":[35,66,74,124],"functionalities.":[36,125],"Most":[37],"works":[38],"this":[40,69,132],"field":[41],"focus":[42],"just":[44],"one":[45],"two":[47],"specific":[48],"functionalities,":[49,192],"resulting":[50],"large":[53],"variety":[54],"isolated":[56],"schemes":[57],"and":[58,103,114,144,162,167,205,209,240,289],"lack":[60],"unified":[63],"framework":[64,110,136,158,269],"research.":[67],"In":[68],"work,":[70],"we":[71],"present":[72],"an":[73],"framework,":[75,226],"which":[76,227],"allows":[77],"parties,":[79],"each":[80],"holding":[81],"set,":[83],"securely":[85],"compute":[86],"any":[87],"formulas":[89],"(arbitrary":[90],"compositions":[91],"finite":[94],"number":[95,285],"binary":[97],"operations,":[99],"including":[100],"intersection,":[101],"difference)":[104],"sets.":[108],"Our":[109,157],"is":[111,133,182,270,290],"highly":[112],"versatile":[113],"can":[115],"be":[116,296],"instantiated":[117],"accommodate":[119],"broad":[121],"spectrum":[122],"To":[126],"best":[128],"our":[130,225,268],"knowledge,":[131],"first":[135,214],"achieve":[138],"such":[139,193],"level":[141],"flexibility":[143],"generality":[145],"MPSO,":[147],"without":[148],"relying":[149],"generic":[151],"(MPC)":[155],"techniques.":[156],"exhibits":[159],"favorable":[160],"theoretical":[161],"practical":[163],"performance.":[164],"With":[165],"communication":[168],"complexity":[169,180],"scaling":[170],"linearly":[171],"with":[172,185,201,207,246],"size":[175],"n,":[176],"it":[177,294],"achieves":[178],"optimal":[179],"that":[181,249],"par":[184],"naive":[187],"solution":[188],"for":[189,212,236],"widely":[190],"used":[191],"as":[194],"(MPSI),":[199],"MPSI":[200,206],"cardinality":[202,208],"output":[203],"(MPSI-card),":[204],"sum":[210],"(MPSI-card-sum),":[211],"time":[215],"standard":[218,260],"semi-honest":[219,261],"model.":[220,262],"Furthermore,":[221],"instantiations":[223],"primarily":[228],"rely":[229],"symmetric-key":[231],"techniques,":[232],"provide":[233],"efficient":[234],"MPSI,":[237],"MPSI-card,":[238],"MPSI-card-sum,":[239],"(MPSU),":[245],"online":[247],"performance":[248],"either":[250],"surpasses":[251],"matches":[253],"state":[255],"art":[258],"At":[263],"technical":[265],"core":[266],"newly":[272],"introduced":[273],"primitive":[274,279],"called":[275],"predicative":[276],"zero-sharing.":[277],"This":[278],"captures":[280],"universality":[282],"MPC":[287],"composable.":[291],"We":[292],"believe":[293],"may":[295],"independent":[298],"interest.":[299]},"counts_by_year":[],"updated_date":"2026-03-07T13:37:22.277990","created_date":"2025-11-23T00:00:00"}
