{"id":"https://openalex.org/W2922208295","doi":"https://doi.org/10.23919/isita.2018.8664390","title":"Tree-based Secure Comparison of Secret Shared Data","display_name":"Tree-based Secure Comparison of Secret Shared Data","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2922208295","doi":"https://doi.org/10.23919/isita.2018.8664390","mag":"2922208295"},"language":"en","primary_location":{"id":"doi:10.23919/isita.2018.8664390","is_oa":false,"landing_page_url":"https://doi.org/10.23919/isita.2018.8664390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5028908883","display_name":"Hiraku Morita","orcid":"https://orcid.org/0000-0003-3547-7725"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hiraku Morita","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062335887","display_name":"Nuttapong Attrapadung","orcid":"https://orcid.org/0000-0003-4116-1751"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nuttapong Attrapadung","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000871530","display_name":"Satsuya Ohata","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Satsuya Ohata","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049459225","display_name":"Shota Yamada","orcid":"https://orcid.org/0000-0002-7338-686X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Shota Yamada","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002435737","display_name":"Koji Nuida","orcid":"https://orcid.org/0000-0001-8259-9958"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Koji Nuida","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047836988","display_name":"Goichiro Hanaoka","orcid":"https://orcid.org/0000-0001-6617-2962"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Goichiro Hanaoka","raw_affiliation_strings":["AIST, Tokyo, Japan"],"affiliations":[{"raw_affiliation_string":"AIST, Tokyo, Japan","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5028908883"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3258,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.69808558,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"525","last_page":"529"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.852654218673706},{"id":"https://openalex.org/keywords/secure-two-party-computation","display_name":"Secure two-party computation","score":0.6424022316932678},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6203011274337769},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5543663501739502},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.5136505961418152},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.5035657286643982},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.49480003118515015},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.48069220781326294},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.4675653874874115},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.42178648710250854},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.40915119647979736},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.19296687841415405},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08273860812187195}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.852654218673706},{"id":"https://openalex.org/C13652956","wikidata":"https://www.wikidata.org/wiki/Q7444883","display_name":"Secure two-party computation","level":4,"score":0.6424022316932678},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6203011274337769},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5543663501739502},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.5136505961418152},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.5035657286643982},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.49480003118515015},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.48069220781326294},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.4675653874874115},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42178648710250854},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.40915119647979736},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.19296687841415405},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08273860812187195},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/isita.2018.8664390","is_oa":false,"landing_page_url":"https://doi.org/10.23919/isita.2018.8664390","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 International Symposium on Information Theory and Its Applications (ISITA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1483068961","https://openalex.org/W1513083922","https://openalex.org/W1527364695","https://openalex.org/W1557590790","https://openalex.org/W1562018356","https://openalex.org/W1579771234","https://openalex.org/W1582612001","https://openalex.org/W1853639762","https://openalex.org/W1888364621","https://openalex.org/W1935182841","https://openalex.org/W1969009977","https://openalex.org/W2003668524","https://openalex.org/W2026594926","https://openalex.org/W2027471022","https://openalex.org/W2113474134","https://openalex.org/W2130901615","https://openalex.org/W2149603017","https://openalex.org/W2156001253","https://openalex.org/W2157253445","https://openalex.org/W2536058570","https://openalex.org/W2701059868","https://openalex.org/W2896507390","https://openalex.org/W2990399857","https://openalex.org/W6630663740","https://openalex.org/W6631619477","https://openalex.org/W6634741103","https://openalex.org/W6639117963"],"related_works":["https://openalex.org/W2083701517","https://openalex.org/W2082804893","https://openalex.org/W2382527959","https://openalex.org/W87038205","https://openalex.org/W2539281752","https://openalex.org/W2550686250","https://openalex.org/W2069340834","https://openalex.org/W2166322483","https://openalex.org/W2125679084","https://openalex.org/W3152465837"],"abstract_inverted_index":{"A":[0],"secure":[1,44],"integer":[2],"comparison":[3,46],"protocol":[4,47,71,96],"is":[5,64,82,97],"one":[6],"of":[7,16,59],"the":[8,27,49],"most":[9],"fundamental":[10],"building":[11],"blocks":[12],"to":[13,25,77,99],"construct":[14],"protocols":[15],"rich":[17],"functionality":[18,29],"in":[19,33,48,57,102],"multi-party":[20],"computation.":[21],"It":[22],"allows":[23],"parties":[24],"compute":[26],"less-than":[28],"on":[30],"shared":[31],"values":[32],"privacy":[34],"preserving":[35],"manner.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40],"present":[41],"a":[42],"tree-based":[43],"two-party":[45],"client-aided":[50],"client-server":[51],"model,":[52],"which":[53,81],"outperforms":[54],"existing":[55,90],"approaches":[56],"terms":[58],"round":[60],"complexity":[61],"when":[62],"it":[63],"used":[65,101],"for":[66],"64-bit":[67,79],"data.":[68],"Our":[69],"proposed":[70],"requires":[72],"only":[73],"9":[74],"communication":[75],"rounds":[76,88],"compare":[78],"data,":[80],"at":[83],"least":[84],"3":[85],"times":[86],"fewer":[87],"than":[89],"protocols.":[91],"This":[92],"suggests":[93],"that":[94],"our":[95],"adequate":[98],"be":[100],"low-latency":[103],"networks":[104],"such":[105],"as":[106],"WAN.":[107]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
