{"id":"https://openalex.org/W2729599932","doi":"https://doi.org/10.1515/popets-2017-0047","title":"UnLynx: A Decentralized System for Privacy-Conscious Data Sharing","display_name":"UnLynx: A Decentralized System for Privacy-Conscious Data Sharing","publication_year":2017,"publication_date":"2017-10-01","ids":{"openalex":"https://openalex.org/W2729599932","doi":"https://doi.org/10.1515/popets-2017-0047","mag":"2729599932"},"language":"en","primary_location":{"id":"doi:10.1515/popets-2017-0047","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0047","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p232.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p232.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031281762","display_name":"David Froelicher","orcid":"https://orcid.org/0000-0002-5012-7486"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"David Froelicher","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088566574","display_name":"Patricia Egger","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Patricia Egger","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091369772","display_name":"Jo\u00e3o S\u00e1 Sousa","orcid":"https://orcid.org/0000-0002-7145-3539"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jo\u00e3o S\u00e1 Sousa","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062272913","display_name":"Jean Louis Raisaro","orcid":"https://orcid.org/0000-0003-2052-6133"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jean Louis Raisaro","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063170074","display_name":"Zhicong Huang","orcid":"https://orcid.org/0000-0003-1338-611X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhicong Huang","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036278600","display_name":"Christian Mouchet","orcid":"https://orcid.org/0000-0001-5686-9459"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christian Mouchet","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045962151","display_name":"Bryan Ford","orcid":"https://orcid.org/0000-0002-0528-3033"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bryan Ford","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080497445","display_name":"Jean\u2010Pierre Hubaux","orcid":"https://orcid.org/0000-0003-1533-6132"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jean-Pierre Hubaux","raw_affiliation_strings":["EPFL"],"affiliations":[{"raw_affiliation_string":"EPFL","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5031281762"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.973,"has_fulltext":false,"cited_by_count":56,"citation_normalized_percentile":{"value":0.96121025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2017","issue":"4","first_page":"232","last_page":"250"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9918000102043152,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7849002480506897},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6510893106460571},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5721836090087891},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5631564855575562},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5556567907333374},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5441776514053345},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5408177971839905},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5217976570129395},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48555299639701843},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.48493149876594543},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.47532203793525696},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.4619920551776886},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.44056209921836853},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3323701024055481},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.19360584020614624},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11517474055290222}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7849002480506897},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6510893106460571},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5721836090087891},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5631564855575562},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5556567907333374},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5441776514053345},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5408177971839905},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5217976570129395},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48555299639701843},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.48493149876594543},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.47532203793525696},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.4619920551776886},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.44056209921836853},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3323701024055481},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.19360584020614624},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11517474055290222},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1515/popets-2017-0047","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0047","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p232.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2da15ec99e79478b871760bb5fe72bfe","is_oa":true,"landing_page_url":"https://doaj.org/article/2da15ec99e79478b871760bb5fe72bfe","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, Vol 2017, Iss 4, Pp 232-250 (2017)","raw_type":"article"},{"id":"pmh:oai:infoscience.tind.io:229308","is_oa":true,"landing_page_url":"https://github.com/lca1/unlynx","pdf_url":null,"source":{"id":"https://openalex.org/S4306400487","display_name":"Infoscience (Ecole Polytechnique F\u00e9d\u00e9rale de Lausanne)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference proceedings"},{"id":"pmh:oai:iris.unil.ch:iris/177766","is_oa":false,"landing_page_url":"https://iris.unil.ch/handle/iris/177766","pdf_url":null,"source":{"id":"https://openalex.org/S7407055444","display_name":"IRIS","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"journal article"},{"id":"pmh:oai:serval.unil.ch:BIB_B0D7721A18A6","is_oa":false,"landing_page_url":"https://serval.unil.ch/notice/serval:BIB_B0D7721A18A6","pdf_url":null,"source":{"id":"https://openalex.org/S4306401797","display_name":"SERVAL (Universit\u00e9 de Lausanne)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210093590","host_organization_name":"Swiss School of Archaeology in Greece","host_organization_lineage":["https://openalex.org/I4210093590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Proceedings on Privacy Enhancing Technologies, vol. 2017, no. 4, pp. 232-250","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/popets-2017-0047","is_oa":true,"landing_page_url":"https://doi.org/10.1515/popets-2017-0047","pdf_url":"https://content.sciendo.com/downloadpdf/journals/popets/2017/4/article-p232.pdf","source":{"id":"https://openalex.org/S4210183172","display_name":"Proceedings on Privacy Enhancing Technologies","issn_l":"2299-0984","issn":["2299-0984"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320322","host_organization_name":"De Gruyter Open","host_organization_lineage":["https://openalex.org/P4310320322","https://openalex.org/P4310313990"],"host_organization_lineage_names":["De Gruyter Open","De Gruyter"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings on Privacy Enhancing Technologies","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2729599932.pdf","grobid_xml":"https://content.openalex.org/works/W2729599932.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W182534311","https://openalex.org/W278760476","https://openalex.org/W1479047698","https://openalex.org/W1479826086","https://openalex.org/W1485800369","https://openalex.org/W1493343761","https://openalex.org/W1501894674","https://openalex.org/W1509999778","https://openalex.org/W1520270249","https://openalex.org/W1557833142","https://openalex.org/W1569778844","https://openalex.org/W1577921908","https://openalex.org/W1589034595","https://openalex.org/W1608459536","https://openalex.org/W1873763122","https://openalex.org/W1934458198","https://openalex.org/W1997820219","https://openalex.org/W2005358011","https://openalex.org/W2009291473","https://openalex.org/W2022774249","https://openalex.org/W2037107113","https://openalex.org/W2073814996","https://openalex.org/W2077217970","https://openalex.org/W2091794203","https://openalex.org/W2096515701","https://openalex.org/W2098784025","https://openalex.org/W2099849300","https://openalex.org/W2101770573","https://openalex.org/W2134340933","https://openalex.org/W2140564457","https://openalex.org/W2150620897","https://openalex.org/W2158106499","https://openalex.org/W2159024459","https://openalex.org/W2159915142","https://openalex.org/W2165223967","https://openalex.org/W2186219853","https://openalex.org/W2204863282","https://openalex.org/W2346967072","https://openalex.org/W2441546371","https://openalex.org/W2460441129","https://openalex.org/W2899908146","https://openalex.org/W2911978475"],"related_works":["https://openalex.org/W1557783852","https://openalex.org/W1474916271","https://openalex.org/W3088939963","https://openalex.org/W2357761884","https://openalex.org/W2111019861","https://openalex.org/W2356283120","https://openalex.org/W2363629235","https://openalex.org/W2611818227","https://openalex.org/W2388761115","https://openalex.org/W2081647269"],"abstract_inverted_index":{"Abstract":[0],"Current":[1],"solutions":[2,64],"for":[3,80,224],"privacy-preserving":[4,82],"data":[5,46,59,83,101,105,116,213],"sharing":[6],"among":[7],"multiple":[8,192],"parties":[9],"either":[10],"depend":[11],"on":[12,35,100,170,210],"a":[13,52,76,91,156,159,207,225],"centralized":[14],"authority":[15,93],"that":[16,28,89,167,200],"must":[17],"be":[18,48],"trusted":[19],"and":[20,55,118,126,164,175,185],"provides":[21],"only":[22],"weakest-link":[23],"security":[24],"(e.g.,":[25,40],"the":[26,45,56,112,123,127,132],"entity":[27],"manages":[29],"private/secret":[30],"cryptographic":[31],"keys),":[32],"or":[33],"leverage":[34],"decentralized":[36,78],"but":[37],"impractical":[38],"approaches":[39],"secure":[41,165,208],"multi-party":[42],"computation).":[43],"When":[44],"to":[47,97,135],"shared":[49],"are":[50,65,168],"of":[51,58,122,129,151,158,161,227],"sensitive":[53],"nature":[54],"number":[57],"providers":[60,117],"is":[61,96,153,182],"high,":[62],"these":[63],"not":[66],"appropriate.":[67],"Therefore,":[68],"we":[69],"present":[70],"U":[71,107,140,178,201],"n":[72,104,108,141,179,202],"L":[73,109,142,180,203],"ynx":[74,110,143,181,204],",":[75],"new":[77,162],"system":[79],"efficient":[81],"sharing.":[84],"We":[85],"consider":[86],"m":[87],"servers":[88],"constitute":[90],"collective":[92],"whose":[94],"goal":[95],"verifiably":[98],"compute":[99],"sent":[102],"from":[103],"providers.":[106],"guarantees":[111],"confidentiality,":[113],"unlinkability":[114],"between":[115],"their":[119],"data,":[120],"privacy":[121],"end":[124],"result":[125],"correctness":[128],"computations":[130],"by":[131,187],"servers.":[133],"Furthermore,":[134],"support":[136],"differentially":[137],"private":[138],"queries,":[139],"can":[144,205],"collectively":[145],"add":[146],"noise":[147],"under":[148],"encryption.":[149],"All":[150],"this":[152],"achieved":[154],"through":[155],"combination":[157],"set":[160],"distributed":[163,219],"protocols":[166],"based":[169],"homomorphic":[171],"cryptography,":[172],"verifiable":[173],"shuffling":[174],"zero-knowledge":[176],"proofs.":[177],"highly":[183],"parallelizable":[184],"modular":[186],"design":[188],"as":[189],"it":[190],"enables":[191],"security/privacy":[193],"vs.":[194],"runtime":[195],"tradeoffs.":[196],"Our":[197],"evaluation":[198],"shows":[199],"execute":[206],"survey":[209],"400,000":[211],"personal":[212],"records":[214],"containing":[215],"5":[216],"encrypted":[217],"attributes,":[218],"over":[220],"20":[221],"independent":[222],"databases,":[223],"total":[226],"2,000,000":[228],"ciphertexts,":[229],"in":[230],"24":[231],"minutes.":[232]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":11},{"year":2019,"cited_by_count":6},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":2}],"updated_date":"2026-03-06T13:50:29.536080","created_date":"2017-07-14T00:00:00"}
