{"id":"https://openalex.org/W2582731783","doi":"https://doi.org/10.1504/ijwgs.2017.10002839","title":"Reusable garbled gates for new fully homomorphic encryption service","display_name":"Reusable garbled gates for new fully homomorphic encryption service","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2582731783","doi":"https://doi.org/10.1504/ijwgs.2017.10002839","mag":"2582731783"},"language":"en","primary_location":{"id":"doi:10.1504/ijwgs.2017.10002839","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwgs.2017.10002839","pdf_url":null,"source":{"id":"https://openalex.org/S200047447","display_name":"International Journal of Web and Grid Services","issn_l":"1741-1106","issn":["1741-1106","1741-1114"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web and Grid Services","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://hdl.handle.net/2117/104501","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060155268","display_name":"Dianhua Tang","orcid":"https://orcid.org/0000-0002-3169-4928"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Dianhua Tang","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory (CETC 30), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory (CETC 30), Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Shaanxi, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Shaanxi, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100312321","display_name":"Yunfei Cao","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yunfei Cao","raw_affiliation_strings":["Science and Technology on Communication Security Laboratory (CETC 30), Chengdu, China"],"affiliations":[{"raw_affiliation_string":"Science and Technology on Communication Security Laboratory (CETC 30), Chengdu, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]},{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["School of Telecommunications Engineering, Xidian University, Xi'an, China; Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi'an, China","Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi'an, China","School of Telecommunications Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Telecommunications Engineering, Xidian University, Xi'an, China; Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi'an, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force, Xi'an, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"School of Telecommunications Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007964745","display_name":"Fatos Xhafa","orcid":"https://orcid.org/0000-0001-6569-5497"},"institutions":[{"id":"https://openalex.org/I9617848","display_name":"Universitat Polit\u00e8cnica de Catalunya","ror":"https://ror.org/03mb6wj31","country_code":"ES","type":"education","lineage":["https://openalex.org/I9617848"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Fatos Xhafa","raw_affiliation_strings":["Department of Computer Science, Technical University of Catalonia, Barcelona, Spain"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Technical University of Catalonia, Barcelona, Spain","institution_ids":["https://openalex.org/I9617848"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5060155268"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.8298,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.79449565,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"13","issue":"1","first_page":"25","last_page":"25"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8255780339241028},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7733310461044312},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6219627857208252},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5458046793937683},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.5234025120735168},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.486623615026474},{"id":"https://openalex.org/keywords/functional-encryption","display_name":"Functional encryption","score":0.4555578827857971},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.44680607318878174},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.41338813304901123},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2119501233100891},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.18916144967079163},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.10859426856040955}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8255780339241028},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7733310461044312},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6219627857208252},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5458046793937683},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.5234025120735168},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.486623615026474},{"id":"https://openalex.org/C2780746774","wikidata":"https://www.wikidata.org/wiki/Q17014981","display_name":"Functional encryption","level":4,"score":0.4555578827857971},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.44680607318878174},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.41338813304901123},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2119501233100891},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.18916144967079163},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.10859426856040955}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1504/ijwgs.2017.10002839","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwgs.2017.10002839","pdf_url":null,"source":{"id":"https://openalex.org/S200047447","display_name":"International Journal of Web and Grid Services","issn_l":"1741-1106","issn":["1741-1106","1741-1114"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Web and Grid Services","raw_type":"journal-article"},{"id":"pmh:oai:upcommons.upc.edu:2117/104501","is_oa":true,"landing_page_url":"https://hdl.handle.net/2117/104501","pdf_url":null,"source":{"id":"https://openalex.org/S4210207057","display_name":"QRU Quaderns de Recerca en Urbanisme","issn_l":"2014-9689","issn":["2014-9689","2385-6777"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310322448","host_organization_name":"Q71272178","host_organization_lineage":["https://openalex.org/P4310322448"],"host_organization_lineage_names":["Q71272178"],"type":"journal"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"pmh:oai:upcommons.upc.edu:2117/104501","is_oa":true,"landing_page_url":"https://hdl.handle.net/2117/104501","pdf_url":null,"source":{"id":"https://openalex.org/S4210207057","display_name":"QRU Quaderns de Recerca en Urbanisme","issn_l":"2014-9689","issn":["2014-9689","2385-6777"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310322448","host_organization_name":"Q71272178","host_organization_lineage":["https://openalex.org/P4310322448"],"host_organization_lineage_names":["Q71272178"],"type":"journal"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W39278537","https://openalex.org/W56544557","https://openalex.org/W80931438","https://openalex.org/W236632755","https://openalex.org/W264971478","https://openalex.org/W1480225633","https://openalex.org/W1515370218","https://openalex.org/W1521253015","https://openalex.org/W1525975689","https://openalex.org/W1557386445","https://openalex.org/W1755636270","https://openalex.org/W1826277484","https://openalex.org/W1855553159","https://openalex.org/W1977620531","https://openalex.org/W1992282993","https://openalex.org/W1998188195","https://openalex.org/W2001127918","https://openalex.org/W2031533839","https://openalex.org/W2037674847","https://openalex.org/W2061106457","https://openalex.org/W2084341361","https://openalex.org/W2088492763","https://openalex.org/W2106217851","https://openalex.org/W2107324709","https://openalex.org/W2113717903","https://openalex.org/W2114486350","https://openalex.org/W2119948977","https://openalex.org/W2134340933","https://openalex.org/W2152144666","https://openalex.org/W2152926062","https://openalex.org/W2156001253","https://openalex.org/W2156030242","https://openalex.org/W2161508639","https://openalex.org/W2170696315","https://openalex.org/W2344670370","https://openalex.org/W2407486123","https://openalex.org/W2579004491","https://openalex.org/W2952272730","https://openalex.org/W3158004924"],"related_works":["https://openalex.org/W1993945719","https://openalex.org/W65414435","https://openalex.org/W2404093901","https://openalex.org/W2886641024","https://openalex.org/W3028837022","https://openalex.org/W2787865077","https://openalex.org/W1857520831","https://openalex.org/W2037867810","https://openalex.org/W177444027","https://openalex.org/W2553883537"],"abstract_inverted_index":{"In":[0],"this":[1,60,92],"paper,":[2],"we":[3,63,88],"propose":[4],"a":[5,10,21,41,72,105,133],"novel":[6],"way":[7,135],"to":[8,70,124,136],"provide":[9,137],"fully":[11,28,73,138],"homomorphic":[12,29,74,139],"encryption":[13,140],"service,":[14],"namely":[15],"by":[16],"using":[17],"garbled":[18,25,47,55,81,101,112,130,143],"circuits.":[19],"From":[20],"high":[22],"level":[23],"perspective,":[24],"circuits":[26,144],"and":[27,141],"encryption,":[30],"both":[31],"aim":[32],"at":[33],"implementing":[34],"complex":[35],"computation":[36],"on":[37,59,96],"ciphertexts.":[38],"We":[39,126],"define":[40],"new":[42,61,93,134],"cryptographic":[43],"primitive":[44,62,94],"named":[45],"reusable":[46,80,100,111,129,142],"gate,":[48],"which":[49,114],"comes":[50],"from":[51,122],"the":[52,77,110,117],"area":[53],"of":[54,79,120],"circuits,":[56,113],"then":[57],"based":[58,95],"show":[64],"that":[65,128],"it":[66],"is":[67,83],"very":[68],"easy":[69],"construct":[71],"encryption.":[75],"However,":[76],"instantiation":[78],"gates":[82,102,131],"rather":[84],"difficult,":[85],"in":[86],"fact,":[87],"can":[89,103,115],"only":[90],"instantiate":[91],"indistinguishable":[97],"obfuscation.":[98],"Furthermore,":[99],"be":[104],"core":[106],"component":[107],"for":[108],"constructing":[109],"reduce":[116],"communication":[118],"complexity":[119],"them":[121],"O(n)":[123],"O(1).":[125],"believe":[127],"promise":[132],"service":[145],"fast.":[146]},"counts_by_year":[{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2017-02-03T00:00:00"}
