{"id":"https://openalex.org/W2624305141","doi":"https://doi.org/10.3233/jcs-150535","title":"Brandt\u2019s fully private auction protocol revisited","display_name":"Brandt\u2019s fully private auction protocol revisited","publication_year":2015,"publication_date":"2015-09-29","ids":{"openalex":"https://openalex.org/W2624305141","doi":"https://doi.org/10.3233/jcs-150535","mag":"2624305141"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-150535","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-150535","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.1210.6780","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087551010","display_name":"Jannik Dreier","orcid":"https://orcid.org/0000-0002-1026-3360"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210121838","display_name":"Laboratoire Lorrain de Recherche en Informatique et ses Applications","ror":"https://ror.org/02vnf0c38","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I277688954","https://openalex.org/I4210107720","https://openalex.org/I4210121838","https://openalex.org/I4210159245","https://openalex.org/I90183372"]},{"id":"https://openalex.org/I4210127166","display_name":"Centre Inria de l'Universit\u00e9 de Lorraine","ror":"https://ror.org/03fcjvn64","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1326498283","https://openalex.org/I4210127166"]},{"id":"https://openalex.org/I90183372","display_name":"Universit\u00e9 de Lorraine","ror":"https://ror.org/04vfs2w97","country_code":"FR","type":"education","lineage":["https://openalex.org/I90183372"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Jannik Dreier","raw_affiliation_strings":["CNRS, Loria, UMR 7503, Vandoeuvre-l\u00e8s-Nancy, France. E-mail:\u00a0jannik.dreier@loria.fr","Inria, Villers-l\u00e8s-Nancy, France","Universit\u00e9 de Lorraine, Loria, UMR 7503, Vandoeuvre-l\u00e8s-Nancy, France","Distributed and Complex Systems"],"affiliations":[{"raw_affiliation_string":"CNRS, Loria, UMR 7503, Vandoeuvre-l\u00e8s-Nancy, France. E-mail:\u00a0jannik.dreier@loria.fr","institution_ids":["https://openalex.org/I4210121838","https://openalex.org/I1294671590"]},{"raw_affiliation_string":"Inria, Villers-l\u00e8s-Nancy, France","institution_ids":["https://openalex.org/I4210127166"]},{"raw_affiliation_string":"Universit\u00e9 de Lorraine, Loria, UMR 7503, Vandoeuvre-l\u00e8s-Nancy, France","institution_ids":["https://openalex.org/I90183372","https://openalex.org/I4210121838"]},{"raw_affiliation_string":"Distributed and Complex Systems","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091337059","display_name":"Jean\u2010Guillaume Dumas","orcid":"https://orcid.org/0000-0002-2591-172X"},"institutions":[{"id":"https://openalex.org/I1294671590","display_name":"Centre National de la Recherche Scientifique","ror":"https://ror.org/02feahw73","country_code":"FR","type":"government","lineage":["https://openalex.org/I1294671590"]},{"id":"https://openalex.org/I4210149092","display_name":"Laboratoire Jean Kuntzmann","ror":"https://ror.org/04ett5b41","country_code":"FR","type":"facility","lineage":["https://openalex.org/I106785703","https://openalex.org/I1294671590","https://openalex.org/I1326498283","https://openalex.org/I4210149092","https://openalex.org/I899635006","https://openalex.org/I899635006"]},{"id":"https://openalex.org/I899635006","display_name":"Universit\u00e9 Grenoble Alpes","ror":"https://ror.org/02rx3b187","country_code":"FR","type":"education","lineage":["https://openalex.org/I899635006"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Jean-Guillaume Dumas","raw_affiliation_strings":["Universit\u00e9 Grenoble Alpes, CNRS, Laboratoire Jean Kuntzmann, Grenoble Cedex 9, France. E-mail:\u00a0jean-guillaume.dumas@imag.fr","CNRS, Laboratoire Jean Kuntzmann (LJK), Universit\u00e9 Grenoble 1, France"],"affiliations":[{"raw_affiliation_string":"Universit\u00e9 Grenoble Alpes, CNRS, Laboratoire Jean Kuntzmann, Grenoble Cedex 9, France. E-mail:\u00a0jean-guillaume.dumas@imag.fr","institution_ids":["https://openalex.org/I4210149092","https://openalex.org/I1294671590","https://openalex.org/I899635006"]},{"raw_affiliation_string":"CNRS, Laboratoire Jean Kuntzmann (LJK), Universit\u00e9 Grenoble 1, France","institution_ids":["https://openalex.org/I4210149092","https://openalex.org/I899635006","https://openalex.org/I1294671590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024799131","display_name":"Pascal Lafourcade","orcid":"https://orcid.org/0000-0002-4459-511X"},"institutions":[{"id":"https://openalex.org/I4210099416","display_name":"Laboratoire d'Informatique, de Mod\u00e9lisation et d'Optimisation des Syst\u00e8mes","ror":"https://ror.org/00t3fpp34","country_code":"FR","type":"facility","lineage":["https://openalex.org/I1294671590","https://openalex.org/I1294671590","https://openalex.org/I198244214","https://openalex.org/I198244214","https://openalex.org/I203339264","https://openalex.org/I205703379","https://openalex.org/I3019848993","https://openalex.org/I4210099416","https://openalex.org/I4210123221","https://openalex.org/I4210159245","https://openalex.org/I4387154249"]}],"countries":["FR"],"is_corresponding":false,"raw_author_name":"Pascal Lafourcade","raw_affiliation_strings":["University Clermont Auvergne, LIMOS, Aubi\u00e8re Cedex, France. E-mail:\u00a0pascal.lafourcade@udamail.fr","Distributed and Complex Systems"],"affiliations":[{"raw_affiliation_string":"University Clermont Auvergne, LIMOS, Aubi\u00e8re Cedex, France. E-mail:\u00a0pascal.lafourcade@udamail.fr","institution_ids":["https://openalex.org/I4210099416"]},{"raw_affiliation_string":"Distributed and Complex Systems","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5087551010"],"corresponding_institution_ids":["https://openalex.org/I1294671590","https://openalex.org/I4210121838","https://openalex.org/I4210127166","https://openalex.org/I90183372"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2185212,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"5","first_page":"587","last_page":"610"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8960999846458435,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8960999846458435,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12374","display_name":"European and International Contract Law","score":0.8539999723434448,"subfield":{"id":"https://openalex.org/subfields/3308","display_name":"Law"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11182","display_name":"Auction Theory and Applications","score":0.8158000111579895,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8817422389984131},{"id":"https://openalex.org/keywords/elgamal-encryption","display_name":"ElGamal encryption","score":0.8182864189147949},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7388643622398376},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7253000736236572},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6324697136878967},{"id":"https://openalex.org/keywords/common-value-auction","display_name":"Common value auction","score":0.6059768795967102},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.5297808647155762},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.5122777819633484},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5021026134490967},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4857836067676544},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.43800026178359985},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.41596513986587524},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.31550467014312744}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8817422389984131},{"id":"https://openalex.org/C11045955","wikidata":"https://www.wikidata.org/wiki/Q1162410","display_name":"ElGamal encryption","level":4,"score":0.8182864189147949},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7388643622398376},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7253000736236572},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6324697136878967},{"id":"https://openalex.org/C163239763","wikidata":"https://www.wikidata.org/wiki/Q5153637","display_name":"Common value auction","level":2,"score":0.6059768795967102},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.5297808647155762},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.5122777819633484},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5021026134490967},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4857836067676544},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.43800026178359985},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.41596513986587524},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.31550467014312744},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":7,"locations":[{"id":"doi:10.3233/jcs-150535","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-150535","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.298.201","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.201","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www-verimag.imag.fr/~plafourc/PAPERS/DDL13.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.648.2507","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.648.2507","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://hal.archives-ouvertes.fr/docs/00/82/21/41/PDF/brandtrev.pdf","raw_type":"text"},{"id":"pmh:oai:HAL:hal-01233555v1","is_oa":false,"landing_page_url":"https://inria.hal.science/hal-01233555","pdf_url":null,"source":{"id":"https://openalex.org/S4306402512","display_name":"HAL (Le Centre pour la Communication Scientifique Directe)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1294671590","host_organization_name":"Centre National de la Recherche Scientifique","host_organization_lineage":["https://openalex.org/I1294671590"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Computer Security, 2015, Special issue on security and high performance computing systems, 23 (5), pp.587-610. &#x27E8;10.3233/JCS-150535&#x27E9;","raw_type":"Journal articles"},{"id":"doi:10.48550/arxiv.1210.6780","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1210.6780","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"},{"id":"mag:2624305141","is_oa":false,"landing_page_url":"https://hal.archives-ouvertes.fr/hal-00745247/document","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Lecture notes in computer science","raw_type":null},{"id":"mag:2951909273","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.48550/arxiv.1210.6780","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.1210.6780","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1772665492","display_name":null,"funder_award_id":"ANR-11-BS02-013","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"},{"id":"https://openalex.org/G4713128106","display_name":null,"funder_award_id":"ANR-2010-VERS-004","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"}],"funders":[{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W19911921","https://openalex.org/W1509765132","https://openalex.org/W1529925669","https://openalex.org/W1534388293","https://openalex.org/W1534940679","https://openalex.org/W1536311772","https://openalex.org/W1547588111","https://openalex.org/W1550910269","https://openalex.org/W1559205210","https://openalex.org/W1567989607","https://openalex.org/W1582538828","https://openalex.org/W1589034595","https://openalex.org/W1617851311","https://openalex.org/W1880030421","https://openalex.org/W1964370100","https://openalex.org/W1984808769","https://openalex.org/W2027865026","https://openalex.org/W2035362408","https://openalex.org/W2040168265","https://openalex.org/W2095708839","https://openalex.org/W2147162619","https://openalex.org/W2148022093","https://openalex.org/W2153193245","https://openalex.org/W2165716457"],"related_works":["https://openalex.org/W2951909273","https://openalex.org/W2403678056","https://openalex.org/W2142836084","https://openalex.org/W2258048085","https://openalex.org/W2144855794","https://openalex.org/W2371185598","https://openalex.org/W3169016779","https://openalex.org/W635176991","https://openalex.org/W1508364540","https://openalex.org/W1486824274","https://openalex.org/W2077234998","https://openalex.org/W2144287737","https://openalex.org/W2951256639","https://openalex.org/W2056103745","https://openalex.org/W2268915829","https://openalex.org/W3162580328","https://openalex.org/W2770768708","https://openalex.org/W597406883","https://openalex.org/W2103915206","https://openalex.org/W2187213389"],"abstract_inverted_index":{"Auctions":[0],"have":[1,24,53],"a":[2,26,81,91,151],"long":[3],"history,":[4],"having":[5],"been":[6,25,54],"recorded":[7],"as":[8,10,185,187],"early":[9],"500":[11],"B.C.":[12],"[Auction":[13],"Theory,":[14],"Academic":[15],"Press,":[16],"San":[17],"Diego,":[18],"USA,":[19],"2002].":[20],"Nowadays,":[21],"electronic":[22,64],"auctions":[23],"great":[27],"success":[28],"and":[29,41,45,115,171,192],"are":[30],"increasingly":[31],"used":[32],"in":[33,66,150],"various":[34,59],"applications,":[35],"including":[36],"high":[37],"performance":[38],"computing":[39],"[Concurrency":[40],"Computatio":[42],"n:":[43],"Practice":[44],"Experience":[46],"14(13\u201315)":[47],"(2002),":[48],"1507\u20131542].":[49],"Many":[50],"cryptographic":[51],"protocols":[52],"proposed":[55],"to":[56,68,137,157,174],"address":[57],"the":[58,85,96,106,113,116,146,155,169,172,193],"security":[60],"requirements":[61],"of":[62,74,95,105,168,195],"these":[63],"transactions,":[65],"particular":[67],"ensure":[69],"privacy.":[70],"Brandt":[71],"[International":[72],"Journal":[73],"Information":[75],"Security":[76],"5":[77],"(2006),":[78],"201\u2013216]":[79],"developed":[80],"protocol":[82,126,170],"that":[83,100,124,153],"computes":[84],"winner":[86,114],"using":[87,129],"homomorphic":[88],"operations":[89],"on":[90,189],"distributed":[92],"ElGamal":[93],"encryption":[94],"bids.":[97,161],"He":[98],"claimed":[99],"it":[101],"ensures":[102],"full":[103],"privacy":[104,194],"bidders,":[107],"i.e.":[108],"no":[109],"information":[110],"apart":[111],"from":[112],"winning":[117],"price":[118],"is":[119,135],"leaked.":[120],"We":[121,162],"first":[122],"show":[123,175],"this":[125],"\u2013":[127,134],"when":[128],"malleable":[130],"interactive":[131],"zero-knowledge":[132],"proofs":[133],"vulnerable":[136],"attacks":[138,188],"by":[139],"dishonest":[140],"bidders.":[141],"Such":[142],"bidders":[143,197],"can":[144],"manipulate":[145],"publicly":[147],"available":[148],"data":[149],"way":[152],"allows":[154],"seller":[156],"deduce":[158],"all":[159],"participants\u2019":[160],"provide":[163],"an":[164],"efficient":[165],"parallelized":[166],"implementation":[167],"attack":[173],"its":[176],"practicality.":[177],"Additionally":[178],"we":[179],"discuss":[180],"some":[181],"issues":[182],"with":[183],"verifiability":[184],"well":[186],"non-repudiation,":[190],"fairness":[191],"individual":[196],"exploiting":[198],"authentication":[199],"problems.":[200]},"counts_by_year":[],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
