{"id":"https://openalex.org/W2735633731","doi":"https://doi.org/10.1515/popets-2017-0026","title":"Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute","display_name":"Privacy-Preserving Computation with Trusted Computing via Scramble-then-Compute","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2735633731","doi":"https://doi.org/10.1515/popets-2017-0026","mag":"2735633731"},"language":"en","primary_location":{"id":"doi:10.1515/popets-2017-0026","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0026","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p21.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p21.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013241108","display_name":"Hung Dang","orcid":null},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":true,"raw_author_name":"Hung Dang","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033418193","display_name":"Tien Tuan Anh Dinh","orcid":"https://orcid.org/0000-0002-8158-3636"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Tien Tuan Anh Dinh","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105408906","display_name":"Ee\u2010Chien Chang","orcid":"https://orcid.org/0000-0003-4613-0866"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Ee-Chien Chang","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024892041","display_name":"Beng Chin Ooi","orcid":"https://orcid.org/0000-0003-4446-1100"},"institutions":[{"id":"https://openalex.org/I165932596","display_name":"National University of Singapore","ror":"https://ror.org/01tgyzw49","country_code":"SG","type":"education","lineage":["https://openalex.org/I165932596"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Beng Chin Ooi","raw_affiliation_strings":["National University of Singapore"],"affiliations":[{"raw_affiliation_string":"National University of Singapore","institution_ids":["https://openalex.org/I165932596"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5013241108"],"corresponding_institution_ids":["https://openalex.org/I165932596"],"apc_list":null,"apc_paid":null,"fwci":1.1701,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.84037376,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2017","issue":"3","first_page":"21","last_page":"38"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10478","display_name":"Diamond and Carbon-based Materials Research","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/2505","display_name":"Materials Chemistry"},"field":{"id":"https://openalex.org/fields/25","display_name":"Materials Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8580480813980103},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.6336785554885864},{"id":"https://openalex.org/keywords/trusted-computing-base","display_name":"Trusted computing base","score":0.5928565263748169},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5737306475639343},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5352132320404053},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5087674260139465},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.49686673283576965},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.4605708420276642},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4391757845878601},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.4385494291782379},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.42614877223968506},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.41989487409591675},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.38662615418434143},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38521134853363037},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.331393301486969},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27731871604919434},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.11569535732269287},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10901066660881042},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.0963512659072876},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.08517152070999146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8580480813980103},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.6336785554885864},{"id":"https://openalex.org/C147346212","wikidata":"https://www.wikidata.org/wiki/Q5492632","display_name":"Trusted computing base","level":4,"score":0.5928565263748169},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5737306475639343},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5352132320404053},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5087674260139465},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.49686673283576965},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.4605708420276642},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4391757845878601},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.4385494291782379},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.42614877223968506},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.41989487409591675},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.38662615418434143},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38521134853363037},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.331393301486969},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27731871604919434},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.11569535732269287},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10901066660881042},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0963512659072876},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.08517152070999146},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/popets-2017-0026","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0026","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p21.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bb416b3ec44a490c83ce577d06c8ff54","is_oa":true,"landing_page_url":"https://doaj.org/article/bb416b3ec44a490c83ce577d06c8ff54","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 3, Pp 21-38 (2017)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/popets-2017-0026","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0026","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/3/article-p21.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4099999964237213,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2735633731.pdf","grobid_xml":"https://content.openalex.org/works/W2735633731.grobid-xml"},"referenced_works_count":49,"referenced_works":["https://openalex.org/W802704771","https://openalex.org/W1496650143","https://openalex.org/W1534388293","https://openalex.org/W1569778844","https://openalex.org/W1581575728","https://openalex.org/W1704895987","https://openalex.org/W1782876448","https://openalex.org/W1820210258","https://openalex.org/W1852007091","https://openalex.org/W1878874188","https://openalex.org/W1892798954","https://openalex.org/W1966747660","https://openalex.org/W1982003698","https://openalex.org/W1988374166","https://openalex.org/W1988768686","https://openalex.org/W1992282993","https://openalex.org/W1996641400","https://openalex.org/W1997575000","https://openalex.org/W2024197950","https://openalex.org/W2031533839","https://openalex.org/W2048702750","https://openalex.org/W2061643296","https://openalex.org/W2073814996","https://openalex.org/W2087946700","https://openalex.org/W2099068032","https://openalex.org/W2103647628","https://openalex.org/W2106011067","https://openalex.org/W2108834246","https://openalex.org/W2123139266","https://openalex.org/W2128159601","https://openalex.org/W2132172731","https://openalex.org/W2142151675","https://openalex.org/W2151316814","https://openalex.org/W2159915142","https://openalex.org/W2167394920","https://openalex.org/W2167804035","https://openalex.org/W2170993700","https://openalex.org/W2178828050","https://openalex.org/W2183241612","https://openalex.org/W2189465200","https://openalex.org/W2243935923","https://openalex.org/W2250570571","https://openalex.org/W2289716913","https://openalex.org/W2345173537","https://openalex.org/W2400669547","https://openalex.org/W2460441129","https://openalex.org/W2963288913","https://openalex.org/W3198160809","https://openalex.org/W3206893151"],"related_works":["https://openalex.org/W2358352283","https://openalex.org/W2356797718","https://openalex.org/W2116177289","https://openalex.org/W143066512","https://openalex.org/W2382159354","https://openalex.org/W2025014554","https://openalex.org/W2377235694","https://openalex.org/W2051856262","https://openalex.org/W2387129584","https://openalex.org/W4224230903"],"abstract_inverted_index":{"Abstract":[0],"We":[1,119],"consider":[2],"privacy-preserving":[3,60,102,140],"computation":[4,39,65],"of":[5,171],"big":[6],"data":[7,20,32,35,111],"using":[8,51],"trusted":[9,25,72,156],"computing":[10,26],"primitives":[11],"with":[12],"limited":[13],"private":[14],"memory.":[15],"Simply":[16],"ensuring":[17],"that":[18,107,181],"the":[19,24,110,116],"remains":[21],"encrypted":[22],"outside":[23],"environment":[27],"is":[28,45,62,68,160],"insufficient":[29],"to":[30,47,70,81,115,153,166,188],"preserve":[31],"privacy,":[33],"for":[34,76,175],"movement":[36],"observed":[37],"during":[38],"could":[40,185],"leak":[41],"information.":[42],"While":[43],"it":[44,67,114],"possible":[46],"thwart":[48],"such":[49,54],"leakage":[50],"generic":[52],"solution":[53],"as":[55],"ORAM":[56],"[42],":[57],"designing":[58],"efficient":[59,173],"algorithms":[61,96,136,174],"challenging.":[63],"Besides":[64],"efficiency,":[66],"critical":[69],"keep":[71],"code":[73,157],"bases":[74],"lean,":[75],"large":[77],"ones":[78],"are":[79],"unwieldy":[80],"vet":[82],"and":[83,127,149],"verify.":[84],"In":[85],"this":[86,121],"paper,":[87],"we":[88],"advocate":[89],"a":[90,105,129,154],"simple":[91],"approach":[92,122,146],"wherein":[93],"many":[94],"basic":[95],"(e.g.,":[97],"sorting)":[98],"can":[99,137],"be":[100,138],"made":[101,139],"by":[103],"adding":[104],"step":[106],"securely":[108],"scrambles":[109],"before":[112],"feeding":[113],"original":[117],"algorithms.":[118],"call":[120],"Scramble-then-Compute":[123],"(S":[124],"t":[125,143,183],"C),":[126],"give":[128],"sufficient":[130],"condition":[131],"whereby":[132],"existing":[133],"external":[134],"memory":[135],"via":[141],"S":[142,182],"C.":[144],"This":[145],"facilitates":[147],"code-reuse,":[148],"its":[150],"simplicity":[151],"contributes":[152],"smaller":[155],"base.":[158],"It":[159],"also":[161],"general,":[162],"allowing":[163],"algorithm":[164],"designers":[165],"leverage":[167],"an":[168],"extensive":[169],"body":[170],"known":[172],"better":[176],"performance.":[177],"Our":[178],"experiments":[179],"show":[180],"C":[184],"offer":[186],"up":[187],"4.1\u00d7":[189],"speedups":[190],"over":[191],"known,":[192],"application-specific":[193],"alternatives.":[194]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
