{"id":"https://openalex.org/W4327747203","doi":"https://doi.org/10.3233/fi-222143","title":"On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols","display_name":"On Insecure Uses of BGN for Privacy Preserving Data Aggregation Protocols","publication_year":2023,"publication_date":"2023-03-15","ids":{"openalex":"https://openalex.org/W4327747203","doi":"https://doi.org/10.3233/fi-222143"},"language":"en","primary_location":{"id":"doi:10.3233/fi-222143","is_oa":false,"landing_page_url":"https://doi.org/10.3233/fi-222143","pdf_url":null,"source":{"id":"https://openalex.org/S39012697","display_name":"Fundamenta Informaticae","issn_l":"0169-2968","issn":["0169-2968","1875-8681"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Fundamenta Informaticae","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090590808","display_name":"Hyang-Sook Lee","orcid":"https://orcid.org/0000-0001-9506-5760"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Hyang-Sook Lee","raw_affiliation_strings":["Department of Mathematics, Ewha Womans University, Seoul, Republic of Korea,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Ewha Womans University, Seoul, Republic of Korea,","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5090590808","display_name":"Hyang-Sook Lee","orcid":"https://orcid.org/0000-0001-9506-5760"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]},{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Hyang-Sook Lee","raw_affiliation_strings":["Department of Mathematics, Ewha Womans University, Seoul, Republic of Korea,","Department of Mathematics, Inha University, Incheon, Republic of Korea, ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Ewha Womans University, Seoul, Republic of Korea,","institution_ids":["https://openalex.org/I138925566"]},{"raw_affiliation_string":"Department of Mathematics, Inha University, Incheon, Republic of Korea, ,","institution_ids":["https://openalex.org/I191879574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000016154","display_name":"Seongan Lim","orcid":"https://orcid.org/0000-0002-1192-6672"},"institutions":[{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Seongan Lim","raw_affiliation_strings":["Department of Mathematics, Inha University, Incheon, Republic of Korea, ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Inha University, Incheon, Republic of Korea, ,","institution_ids":["https://openalex.org/I191879574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018589956","display_name":"Ikkwon Yie","orcid":null},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]},{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Ikkwon Yie","raw_affiliation_strings":["Department of Mathematics, Inha University, Incheon, Republic of Korea, ,","Department of Cyber Security, Ewha Womans University, Seoul, Republic of Korea,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Inha University, Incheon, Republic of Korea, ,","institution_ids":["https://openalex.org/I191879574"]},{"raw_affiliation_string":"Department of Cyber Security, Ewha Womans University, Seoul, Republic of Korea,","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018589956","display_name":"Ikkwon Yie","orcid":null},"institutions":[{"id":"https://openalex.org/I191879574","display_name":"Inha University","ror":"https://ror.org/01easw929","country_code":"KR","type":"education","lineage":["https://openalex.org/I191879574"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Ikkwon Yie","raw_affiliation_strings":["Department of Mathematics, Inha University, Incheon, Republic of Korea, ,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Mathematics, Inha University, Incheon, Republic of Korea, ,","institution_ids":["https://openalex.org/I191879574"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070910299","display_name":"Aaram Yun","orcid":"https://orcid.org/0000-0003-3502-2296"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Aaram Yun","raw_affiliation_strings":["Department of Cyber Security, Ewha Womans University, Seoul, Republic of Korea,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Ewha Womans University, Seoul, Republic of Korea,","institution_ids":["https://openalex.org/I138925566"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070910299","display_name":"Aaram Yun","orcid":"https://orcid.org/0000-0003-3502-2296"},"institutions":[{"id":"https://openalex.org/I138925566","display_name":"Ewha Womans University","ror":"https://ror.org/053fp5c05","country_code":"KR","type":"education","lineage":["https://openalex.org/I138925566"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Aaram Yun","raw_affiliation_strings":["Department of Cyber Security, Ewha Womans University, Seoul, Republic of Korea,"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Cyber Security, Ewha Womans University, Seoul, Republic of Korea,","institution_ids":["https://openalex.org/I138925566"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5000016154","https://openalex.org/A5018589956","https://openalex.org/A5070910299","https://openalex.org/A5090590808"],"corresponding_institution_ids":["https://openalex.org/I138925566","https://openalex.org/I191879574"],"apc_list":null,"apc_paid":null,"fwci":0.5036,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.69353438,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":98},"biblio":{"volume":"188","issue":"2","first_page":"91","last_page":"101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9833999872207642,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9825999736785889,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cryptosystem","display_name":"Cryptosystem","score":0.846153736114502},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.7903491258621216},{"id":"https://openalex.org/keywords/blinding","display_name":"Blinding","score":0.6823453307151794},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6326406002044678},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5962311029434204},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4612047076225281},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4545539617538452},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4085099697113037},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3929281532764435},{"id":"https://openalex.org/keywords/hybrid-cryptosystem","display_name":"Hybrid cryptosystem","score":0.31364864110946655},{"id":"https://openalex.org/keywords/chemistry","display_name":"Chemistry","score":0.09829014539718628}],"concepts":[{"id":"https://openalex.org/C6295992","wikidata":"https://www.wikidata.org/wiki/Q976521","display_name":"Cryptosystem","level":3,"score":0.846153736114502},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.7903491258621216},{"id":"https://openalex.org/C2771230","wikidata":"https://www.wikidata.org/wiki/Q4926699","display_name":"Blinding","level":3,"score":0.6823453307151794},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6326406002044678},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5962311029434204},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4612047076225281},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4545539617538452},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4085099697113037},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3929281532764435},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.31364864110946655},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.09829014539718628},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/fi-222143","is_oa":false,"landing_page_url":"https://doi.org/10.3233/fi-222143","pdf_url":null,"source":{"id":"https://openalex.org/S39012697","display_name":"Fundamenta Informaticae","issn_l":"0169-2968","issn":["0169-2968","1875-8681"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Fundamenta Informaticae","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1528334372","https://openalex.org/W1515856307","https://openalex.org/W197565096","https://openalex.org/W2092526533","https://openalex.org/W2384195984","https://openalex.org/W4238582915","https://openalex.org/W2126445990","https://openalex.org/W2023320843","https://openalex.org/W3183297242","https://openalex.org/W4401608539"],"abstract_inverted_index":{"The":[0],"notion":[1],"of":[2,18,31,33,41,61,70,74,90,108,164,189],"aggregator":[3],"oblivious":[4],"(AO)":[5],"security":[6,57,79],"for":[7,45,113,122,194],"privacy":[8,91,102,132,183],"preserving":[9,92,133],"data":[10,34,64,93],"aggregation":[11,35,65,94],"was":[12],"formalized":[13],"with":[14,77],"a":[15,23,86,151],"specific":[16],"construction":[17],"AO-secure":[19],"blinding":[20,39,106,120,187],"technique":[21,40,107,188],"over":[22],"cyclic":[24],"group":[25],"by":[26],"Shi":[27,42,109,190],"et":[28,43,110,191],"al.":[29,44,111,192],"Some":[30],"proposals":[32],"protocols":[36,66,129],"use":[37],"the":[38,68,81,101,105,119,123,135,137,144,147,162,165,168,186],"BGN":[46,62,82,114,124,148,195],"cryptosystem,":[47],"an":[48],"additive":[49],"homomorphic":[50],"encryption.":[51],"Previously,":[52],"there":[53],"have":[54],"been":[55,85],"some":[56,60],"analysis":[58,140],"on":[59,143,171],"based":[63,142],"in":[67,104,127,185],"context":[69],"integrity":[71],"or":[72],"authenticity":[73],"data.":[75],"Even":[76],"such":[78,182],"analysis,":[80],"cryptosystem":[83,125,149],"has":[84],"popular":[87],"building":[88],"block":[89],"protocol.":[95],"In":[96],"this":[97],"paper,":[98],"we":[99],"study":[100],"issues":[103],"used":[112,126,193],"cryptosystem.":[115,196],"We":[116,176],"show":[117],"that":[118,146],"techniques":[121],"several":[128],"are":[130],"not":[131],"against":[134],"recipient,":[136],"decryptor.":[138],"Our":[139],"is":[141],"fact":[145],"uses":[150],"pairing":[152,166],"e":[153],":":[154],"G":[155,157,159,172],"\u00d7":[156],"\u2192":[158],"T":[160],"and":[161],"existence":[163],"makes":[167],"DDH":[169],"problem":[170],"easy":[173],"to":[174,180],"solve.":[175],"also":[177],"suggest":[178],"how":[179],"prevent":[181],"leakage":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2}],"updated_date":"2026-05-08T15:41:06.802602","created_date":"2025-10-10T00:00:00"}
