{"id":"https://openalex.org/W7138303908","doi":"https://doi.org/10.1609/aaai.v40i20.38773","title":"Truth, Justice, and Secrecy: Cake Cutting Under Privacy Constraints","display_name":"Truth, Justice, and Secrecy: Cake Cutting Under Privacy Constraints","publication_year":2026,"publication_date":"2026-03-14","ids":{"openalex":"https://openalex.org/W7138303908","doi":"https://doi.org/10.1609/aaai.v40i20.38773"},"language":null,"primary_location":{"id":"doi:10.1609/aaai.v40i20.38773","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i20.38773","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38773/42735","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38773/42735","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030039467","display_name":"Yaron Salman","orcid":"https://orcid.org/0000-0001-9064-5125"},"institutions":[{"id":"https://openalex.org/I164950643","display_name":"Open University of Israel","ror":"https://ror.org/027z64205","country_code":"IL","type":"education","lineage":["https://openalex.org/I164950643"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Yaron Salman","raw_affiliation_strings":["Open University of Israel"],"affiliations":[{"raw_affiliation_string":"Open University of Israel","institution_ids":["https://openalex.org/I164950643"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080737186","display_name":"Tamir Tassa","orcid":"https://orcid.org/0000-0001-9681-8824"},"institutions":[{"id":"https://openalex.org/I164950643","display_name":"Open University of Israel","ror":"https://ror.org/027z64205","country_code":"IL","type":"education","lineage":["https://openalex.org/I164950643"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Tamir Tassa","raw_affiliation_strings":["Open University of Israel"],"affiliations":[{"raw_affiliation_string":"Open University of Israel","institution_ids":["https://openalex.org/I164950643"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129705185","display_name":"Omer Lev","orcid":null},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Omer Lev","raw_affiliation_strings":["Ben-Gurion University of the Negev"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056071243","display_name":"Roie Zivan","orcid":"https://orcid.org/0000-0002-1410-8368"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Roie Zivan","raw_affiliation_strings":["Ben-Gurion University of the Negev"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University of the Negev","institution_ids":["https://openalex.org/I124227911"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5030039467"],"corresponding_institution_ids":["https://openalex.org/I164950643"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.51605996,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"40","issue":"20","first_page":"17223","last_page":"17230"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.24570000171661377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.24570000171661377,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10991","display_name":"Game Theory and Voting Systems","score":0.20720000565052032,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11704","display_name":"Mobile Crowdsensing and Crowdsourcing","score":0.13359999656677246,"subfield":{"id":"https://openalex.org/subfields/1706","display_name":"Computer Science Applications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.697700023651123},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6417999863624573},{"id":"https://openalex.org/keywords/product","display_name":"Product (mathematics)","score":0.5620999932289124},{"id":"https://openalex.org/keywords/chen","display_name":"Chen","score":0.4521999955177307},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4043000042438507},{"id":"https://openalex.org/keywords/adaptation","display_name":"Adaptation (eye)","score":0.3962000012397766},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.3928999900817871},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.38029998540878296}],"concepts":[{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.697700023651123},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6417999863624573},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.629800021648407},{"id":"https://openalex.org/C90673727","wikidata":"https://www.wikidata.org/wiki/Q901718","display_name":"Product (mathematics)","level":2,"score":0.5620999932289124},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5292999744415283},{"id":"https://openalex.org/C2776085556","wikidata":"https://www.wikidata.org/wiki/Q183361","display_name":"Chen","level":2,"score":0.4521999955177307},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4043000042438507},{"id":"https://openalex.org/C139807058","wikidata":"https://www.wikidata.org/wiki/Q352374","display_name":"Adaptation (eye)","level":2,"score":0.3962000012397766},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.3928999900817871},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.38029998540878296},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.36169999837875366},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3488999903202057},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3467000126838684},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.3377000093460083},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.33640000224113464},{"id":"https://openalex.org/C78597825","wikidata":"https://www.wikidata.org/wiki/Q484847","display_name":"E-commerce","level":2,"score":0.3100999891757965},{"id":"https://openalex.org/C91810955","wikidata":"https://www.wikidata.org/wiki/Q7731670","display_name":"Incentive compatibility","level":3,"score":0.3070000112056732},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.30469998717308044},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3025999963283539},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.29100000858306885},{"id":"https://openalex.org/C42475967","wikidata":"https://www.wikidata.org/wiki/Q194292","display_name":"Operations research","level":1,"score":0.28870001435279846},{"id":"https://openalex.org/C2776036281","wikidata":"https://www.wikidata.org/wiki/Q48769818","display_name":"Constraint (computer-aided design)","level":2,"score":0.2718999981880188},{"id":"https://openalex.org/C153517567","wikidata":"https://www.wikidata.org/wiki/Q26090","display_name":"Mechanism design","level":2,"score":0.2551000118255615},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.25209999084472656}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1609/aaai.v40i20.38773","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i20.38773","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38773/42735","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1609/aaai.v40i20.38773","is_oa":true,"landing_page_url":"https://doi.org/10.1609/aaai.v40i20.38773","pdf_url":"https://ojs.aaai.org/index.php/AAAI/article/download/38773/42735","source":{"id":"https://openalex.org/S4210191458","display_name":"Proceedings of the AAAI Conference on Artificial Intelligence","issn_l":"2159-5399","issn":["2159-5399","2374-3468"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320058","host_organization_name":"Association for the Advancement of Artificial Intelligence","host_organization_lineage":["https://openalex.org/P4310320058"],"host_organization_lineage_names":["Association for the Advancement of Artificial Intelligence"],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the AAAI Conference on Artificial Intelligence","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7167775630950928,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7138303908.pdf","grobid_xml":"https://content.openalex.org/works/W7138303908.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Cake-cutting":[0],"algorithms,":[1],"which":[2],"aim":[3],"to":[4,37,52,61,73,79,85,173,185],"fairly":[5],"allocate":[6],"a":[7,121,155],"continuous":[8],"resource":[9],"based":[10],"on":[11,30],"individual":[12],"agent":[13],"preferences,":[14],"have":[15],"seen":[16],"significant":[17],"progress":[18],"over":[19],"the":[20,26,68,112,125,132,150],"past":[21],"two":[22],"decades.":[23],"Much":[24],"of":[25,70,115,127,158],"research":[27],"has":[28],"concentrated":[29],"fairness,":[31,54],"with":[32,154],"comparatively":[33],"less":[34],"attention":[35],"given":[36],"other":[38],"important":[39],"aspects.":[40],"In":[41,107],"2010,":[42],"Chen":[43,116],"et":[44,117],"al.":[45,118],"introduced":[46],"an":[47],"algorithm":[48,114],"that,":[49],"in":[50,67,138],"addition":[51],"ensuring":[53],"was":[55],"strategyproof---meaning":[56],"agents":[57,75,172],"had":[58],"no":[59],"incentive":[60],"misreport":[62],"their":[63,81,175,195],"valuations.":[64],"However,":[65],"even":[66],"absence":[69],"strategic":[71],"incentives":[72],"misreport,":[74],"may":[76],"still":[77],"hesitate":[78],"reveal":[80],"true":[82,176],"preferences":[83,96,177,196],"due":[84],"privacy":[86,162],"concerns":[87],"(e.g.,":[88],"when":[89],"allocating":[90],"advertising":[91],"time":[92],"between":[93],"firms,":[94],"revealing":[95],"could":[97],"inadvertently":[98],"expose":[99],"planned":[100],"marketing":[101],"strategies":[102],"or":[103,166],"product":[104],"launch":[105],"timelines).":[106],"this":[108,140],"work,":[109],"we":[110,130],"extend":[111],"strategyproof":[113],"by":[119],"introducing":[120],"privacy-preserving":[122],"dimension.":[123],"To":[124],"best":[126],"our":[128,169],"knowledge,":[129],"present":[131],"first":[133],"private":[134],"cake-cutting":[135],"protocol,":[136],"and,":[137],"addition,":[139],"protocol":[141,170],"is":[142],"also":[143,188],"envy-free":[144],"and":[145],"strategyproof.":[146],"Our":[147],"approach":[148],"replaces":[149],"algorithm\u2019s":[151],"centralized":[152],"computation":[153],"novel":[156],"adaptation":[157],"cryptographic":[159],"techniques,":[160],"enabling":[161],"without":[163],"compromising":[164],"fairness":[165],"strategyproofness.":[167],"Thus,":[168],"encourages":[171],"report":[174],"not":[178,183],"only":[179],"because":[180,189],"they":[181,190],"are":[182,191],"incentivized":[184],"lie,":[186],"but":[187],"protected":[192],"from":[193],"having":[194],"exposed.":[197]},"counts_by_year":[],"updated_date":"2026-03-20T20:47:17.329874","created_date":"2026-03-18T00:00:00"}
