{"id":"https://openalex.org/W4285411756","doi":"https://doi.org/10.5220/0011279500003283","title":"CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party","display_name":"CatNap: Leveraging Generic MPC for Actively Secure Privacy-enhancing Proximity Testing with a Napping Party","publication_year":2022,"publication_date":"2022-01-01","ids":{"openalex":"https://openalex.org/W4285411756","doi":"https://doi.org/10.5220/0011279500003283"},"language":"en","primary_location":{"id":"doi:10.5220/0011279500003283","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011279500003283","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.5220/0011279500003283","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023479268","display_name":"Ivan Oleynikov","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Ivan Oleynikov","raw_affiliation_strings":["Chalmers University, Gothenburg, Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Chalmers University, Gothenburg, Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064902191","display_name":"Elena Pagnin","orcid":"https://orcid.org/0000-0002-7804-6696"},"institutions":[{"id":"https://openalex.org/I187531555","display_name":"Lund University","ror":"https://ror.org/012a77v79","country_code":"SE","type":"education","lineage":["https://openalex.org/I187531555"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Elena Pagnin","raw_affiliation_strings":["Lund University, Lund, Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Lund University, Lund, Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I187531555"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070340953","display_name":"Andrei Sabelfeld","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Andrei Sabelfeld","raw_affiliation_strings":["Chalmers University, Gothenburg, Sweden, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"Chalmers University, Gothenburg, Sweden, --- Select a Country ---","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023479268"],"corresponding_institution_ids":["https://openalex.org/I66862912"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.51606954,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"237","last_page":"248"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9922999739646912,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7957926392555237},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.6101047992706299},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5932337641716003},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5092722177505493},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.507635235786438},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.47363677620887756},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4163588285446167},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13570639491081238}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7957926392555237},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.6101047992706299},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5932337641716003},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5092722177505493},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.507635235786438},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.47363677620887756},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4163588285446167},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13570639491081238},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.5220/0011279500003283","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011279500003283","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Security and Cryptography","raw_type":"proceedings-article"},{"id":"pmh:oai:lup.lub.lu.se:61c94fa0-7b75-4c22-8013-ec90256d4320","is_oa":false,"landing_page_url":"https://lup.lub.lu.se/record/61c94fa0-7b75-4c22-8013-ec90256d4320","pdf_url":null,"source":{"id":"https://openalex.org/S4306400536","display_name":"Lund University Publications (Lund University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I187531555","host_organization_name":"Lund University","host_organization_lineage":["https://openalex.org/I187531555"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"ISSN: 2184-7711","raw_type":"text"},{"id":"pmh:oai:research.chalmers.se:532209","is_oa":false,"landing_page_url":"https://research.chalmers.se/en/publication/532209","pdf_url":null,"source":{"id":"https://openalex.org/S4306402469","display_name":"Chalmers Research (Chalmers University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I66862912","host_organization_name":"Chalmers University of Technology","host_organization_lineage":["https://openalex.org/I66862912"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"doi:10.5220/0011279500003283","is_oa":true,"landing_page_url":"https://doi.org/10.5220/0011279500003283","pdf_url":null,"source":null,"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 19th International Conference on Security and Cryptography","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W117166206","https://openalex.org/W1213489627","https://openalex.org/W1507432800","https://openalex.org/W1519947574","https://openalex.org/W1583821184","https://openalex.org/W1846950412","https://openalex.org/W1948221507","https://openalex.org/W1969009977","https://openalex.org/W1987758794","https://openalex.org/W2007961402","https://openalex.org/W2025181331","https://openalex.org/W2029543841","https://openalex.org/W2035921576","https://openalex.org/W2049049427","https://openalex.org/W2073782860","https://openalex.org/W2159599286","https://openalex.org/W2295145729","https://openalex.org/W2394957549","https://openalex.org/W2400124473","https://openalex.org/W2576738819","https://openalex.org/W2595595849","https://openalex.org/W2728575722","https://openalex.org/W2748071398","https://openalex.org/W2768714820","https://openalex.org/W2933303456","https://openalex.org/W2949264753","https://openalex.org/W2966263567","https://openalex.org/W2981385419","https://openalex.org/W3014044251","https://openalex.org/W3018008545","https://openalex.org/W3108672920","https://openalex.org/W4287775750"],"related_works":["https://openalex.org/W2092530219","https://openalex.org/W2388464034","https://openalex.org/W2533125852","https://openalex.org/W2140460949","https://openalex.org/W121858127","https://openalex.org/W2105580438","https://openalex.org/W2775143306","https://openalex.org/W2057435755","https://openalex.org/W4289329995","https://openalex.org/W2373574911"],"abstract_inverted_index":{"Proximity":[0],"testing":[1,44],"is":[2,79,115],"at":[3,41,70],"the":[4,65,71,105],"core":[5],"of":[6,14,96,104,123,128,137,145],"several":[7],"Location-Based":[8],"Services":[9],"(LBS).":[10],"Despite":[11],"a":[12,50,134],"series":[13],"reported":[15],"and":[16,113,126,140],"confirmed":[17],"abuses,":[18],"modern":[19],"LBSs":[20],"still":[21],"demand":[22],"their":[23,27],"clients":[24,66,131],"to":[25,33,89],"disclose":[26],"locations":[28],"in":[29,31],"plain":[30],"order":[32],"preform":[34],"location":[35],"proximity":[36,43],"testing.":[37],"This":[38],"works":[39],"aims":[40],"enhancing":[42],"with":[45,119],"privacy.":[46],"We":[47],"design":[48],"CatNap":[49],"novel":[51],"protocol":[52],"that":[53,86],"(1)":[54],"implements":[55],"precise":[56],"Euclidean":[57],"distance":[58],"matching;":[59],"(2)":[60],"allows":[61],"matching":[62],"even":[63],"if":[64],"are":[67],"not":[68],"online":[69],"same":[72],"time":[73,125],"(the":[74],"\"napping":[75],"party\"":[76],"feature);":[77],"(3)":[78],"secure":[80],"against":[81],"active":[82],"adversaries":[83],"(malicious":[84],"actors":[85],"corrupt":[87],"up":[88],"one":[90],"party);":[91],"(4)":[92],"makes":[93],"black-box":[94],"use":[95],"generic":[97],"Multi-Party":[98],"Computation":[99],"techniques":[100],"(any":[101],"future":[102],"improvement":[103],"underlying":[106],"building":[107],"blocks":[108],"will":[109],"also":[110],"boost":[111],"CatNap);":[112],"(5)":[114],"efficient:":[116],"servers":[117],"run":[118],"about":[120],"0.03":[121],"seconds":[122],"CPU":[124],"5.6MB":[127],"communication,":[129],"while":[130],"perform":[132],"only":[133],"small":[135],"number":[136],"Boolean":[138],"operations":[139],"need":[141],"just":[142],"51":[143],"bytes":[144],"communication.":[146]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
