{"id":"https://openalex.org/W3081173147","doi":"https://doi.org/10.1515/jmc-2020-0013","title":"A note on secure multiparty computation via higher residue symbols","display_name":"A note on secure multiparty computation via higher residue symbols","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3081173147","doi":"https://doi.org/10.1515/jmc-2020-0013","mag":"3081173147"},"language":"en","primary_location":{"id":"doi:10.1515/jmc-2020-0013","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0013","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0013/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0013/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058563643","display_name":"Ignacio Cascudo","orcid":"https://orcid.org/0000-0001-5520-5386"},"institutions":[{"id":"https://openalex.org/I4210162154","display_name":"IMDEA Software","ror":"https://ror.org/04xvfkh51","country_code":"ES","type":"facility","lineage":["https://openalex.org/I105140100","https://openalex.org/I4210162154"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Ignacio Cascudo","raw_affiliation_strings":["IMDEA Software Institute , 28223 Pozuelo de Alarcon , Madrid , Spain ; Much of this work was carried out while Ignacio was with the Department of Mathematical Sciences , Aalborg University , Denmark ","IMDEA Software Institute, 28223 Pozuelo de Alarcon, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"IMDEA Software Institute , 28223 Pozuelo de Alarcon , Madrid , Spain ; Much of this work was carried out while Ignacio was with the Department of Mathematical Sciences , Aalborg University , Denmark ","institution_ids":[]},{"raw_affiliation_string":"IMDEA Software Institute, 28223 Pozuelo de Alarcon, Madrid, Spain","institution_ids":["https://openalex.org/I4210162154"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039800094","display_name":"Reto Schnyder","orcid":"https://orcid.org/0000-0002-1711-3605"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Reto Schnyder","raw_affiliation_strings":["Department of Mathematical Sciences , Aalborg University , Aalborg , Denmark","Department of Mathematical Sciences, Aalborg University, 9220 Aalborg, Denmark"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences , Aalborg University , Aalborg , Denmark","institution_ids":["https://openalex.org/I891191580"]},{"raw_affiliation_string":"Department of Mathematical Sciences, Aalborg University, 9220 Aalborg, Denmark","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5039800094"],"corresponding_institution_ids":["https://openalex.org/I891191580"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00695048,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"15","issue":"1","first_page":"284","last_page":"297"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6853216886520386},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6061005592346191},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.574297308921814},{"id":"https://openalex.org/keywords/residue","display_name":"Residue (chemistry)","score":0.564195990562439},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5230665802955627},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4542234539985657},{"id":"https://openalex.org/keywords/arithmetic","display_name":"Arithmetic","score":0.3850422203540802},{"id":"https://openalex.org/keywords/algebra-over-a-field","display_name":"Algebra over a field","score":0.34009575843811035},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3139934539794922},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2809734344482422},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.21353280544281006},{"id":"https://openalex.org/keywords/pure-mathematics","display_name":"Pure mathematics","score":0.09707540273666382},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.09679663181304932}],"concepts":[{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6853216886520386},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6061005592346191},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.574297308921814},{"id":"https://openalex.org/C2781338088","wikidata":"https://www.wikidata.org/wiki/Q903495","display_name":"Residue (chemistry)","level":2,"score":0.564195990562439},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5230665802955627},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4542234539985657},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.3850422203540802},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.34009575843811035},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3139934539794922},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2809734344482422},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.21353280544281006},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.09707540273666382},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.09679663181304932},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1515/jmc-2020-0013","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0013","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0013/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/9709d243-0a24-4dc7-a9ff-607327c1f5e7","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/9709d243-0a24-4dc7-a9ff-607327c1f5e7","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cascudo, I & Schnyder, R A 2021, 'A note on secure multiparty computation via higher residue symbols', Journal of Mathematical Cryptology, vol. 15, no. 1, pp. 284-297. https://doi.org/10.1515/jmc-2020-0013","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:doaj.org/article:4fdb1c80e7154acea554054f495ec3e6","is_oa":true,"landing_page_url":"https://doaj.org/article/4fdb1c80e7154acea554054f495ec3e6","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Mathematical Cryptology, Vol 15, Iss 1, Pp 284-297 (2021)","raw_type":"article"},{"id":"pmh:oai:pure.atira.dk:publications/9709d243-0a24-4dc7-a9ff-607327c1f5e7","is_oa":true,"landing_page_url":"http://www.scopus.com/inward/record.url?scp=85101630275&partnerID=8YFLogxK","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cascudo , I &amp; Schnyder , R A 2021 , ' A note on secure multiparty computation via higher residue symbols ' , Journal of Mathematical Cryptology , vol. 15 , no. 1 , pp. 284-297 . https://doi.org/10.1515/jmc-2020-0013","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jmc-2020-0013","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jmc-2020-0013","pdf_url":"https://www.degruyter.com/document/doi/10.1515/jmc-2020-0013/pdf","source":{"id":"https://openalex.org/S100611479","display_name":"Journal of Mathematical Cryptology","issn_l":"1862-2976","issn":["1862-2976","1862-2984"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313990","host_organization_name":"De Gruyter","host_organization_lineage":["https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Mathematical Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321409","display_name":"Aalborg Universitet","ror":"https://ror.org/04m5j1k67"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3081173147.pdf","grobid_xml":"https://content.openalex.org/works/W3081173147.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W593018359","https://openalex.org/W1592261758","https://openalex.org/W1888364621","https://openalex.org/W2021276494","https://openalex.org/W2077315235","https://openalex.org/W2130901615","https://openalex.org/W2141420453","https://openalex.org/W2397857137","https://openalex.org/W2784889254","https://openalex.org/W2914998350","https://openalex.org/W4231117739","https://openalex.org/W4233185505"],"related_works":["https://openalex.org/W4231775656","https://openalex.org/W2046435967","https://openalex.org/W2032398765","https://openalex.org/W2383646825","https://openalex.org/W2371018915","https://openalex.org/W2069340834","https://openalex.org/W2550686250","https://openalex.org/W2083288298","https://openalex.org/W2076840701","https://openalex.org/W2607129240"],"abstract_inverted_index":{"Abstract":[0],"We":[1,72,93,179],"generalize":[2,73],"a":[3,16,52,89,95,99,117,165,192],"protocol":[4,22],"by":[5],"Yu":[6],"for":[7,35,49,87],"comparing":[8],"two":[9],"integers":[10,50],"with":[11,45,116],"relatively":[12],"small":[13,90,167],"difference":[14],"in":[15,51,80,191],"secure":[17],"multiparty":[18],"computation":[19],"setting.":[20,195],"Yu's":[21],"is":[23,33,177],"based":[24],"on":[25,164],"the":[26,37,46,105,186],"Legendre":[27,38],"symbol.":[28],"A":[29,169],"prime":[30,100],"number":[31,101],"p":[32,42,102,112],"found":[34],"which":[36],"symbol":[39,109,190],"(\u00b7":[40,110],"|":[41,111],")":[43,113],"agrees":[44,115],"sign":[47],"function":[48,119],"certain":[53],"range":[54],"{\u2212":[55],"N":[56,62],",":[57,61],".":[58,59,60],"}":[63],"\u2282":[64,170],"\u2124.":[65],"This":[66],"can":[67],"then":[68],"be":[69],"computed":[70],"efficiently.":[71],"this":[74,176],"idea":[75],"to":[76,97,183],"higher":[77],"residue":[78,108,189],"symbols":[79],"cyclotomic":[81],"rings":[82],"\u2124[":[83,171],"\u03b6":[84,172],"r":[85,88,106,114,173,187],"]":[86],"odd":[91],"prime.":[92],"present":[94],"way":[96],"determine":[98],"such":[103],"that":[104],"-th":[107,188],"desired":[118],"<m:math":[120],"xmlns:m=\"http://www.w3.org/1998/Math/MathML\"":[121],"display=\"inline\">":[122],"<m:mrow>":[123,128,130,142],"<m:mi>f</m:mi>":[124],"<m:mo>:</m:mo>":[125],"<m:mi>A</m:mi>":[126],"<m:mo>\u2192</m:mo>":[127],"<m:mo>{</m:mo>":[129],"<m:msubsup>":[131,139],"<m:mi>\u03b6</m:mi>":[132,140],"<m:mi>r</m:mi>":[133,141,143],"<m:mn>0</m:mn>":[134],"</m:msubsup>":[135,147],"<m:mo>,</m:mo>":[136,138],"<m:mo>\u2026</m:mo>":[137],"<m:mo>\u2212</m:mo>":[144],"<m:mn>1</m:mn>":[145],"</m:mrow>":[146,148,150,151],"<m:mo>}</m:mo>":[149],"</m:math>":[152],"f:A":[153],"\\to":[154],"\\left\\{":[155],"{\\zeta":[156],"_r^0,":[157],"\\ldots":[158],",\\zeta":[159],"_r^{r":[160],"-":[161],"1}}":[162],"\\right\\}":[163],"given":[166],"subset":[168],"],":[174],"when":[175],"possible.":[178],"also":[180],"explain":[181],"how":[182],"efficiently":[184],"compute":[185],"secret":[193],"shared":[194]},"counts_by_year":[],"updated_date":"2025-12-07T23:40:59.601060","created_date":"2025-10-10T00:00:00"}
