{"id":"https://openalex.org/W4406309701","doi":"https://doi.org/10.62056/a0qj5w7sf","title":"Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications","display_name":"Haven++: Batched and Packed Dual-Threshold Asynchronous Complete Secret Sharing with Applications","publication_year":2025,"publication_date":"2025-01-13","ids":{"openalex":"https://openalex.org/W4406309701","doi":"https://doi.org/10.62056/a0qj5w7sf"},"language":"en","primary_location":{"id":"doi:10.62056/a0qj5w7sf","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a0qj5w7sf","pdf_url":"https://cic.iacr.org/p/1/4/3/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/4/3/pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5015099918","display_name":"Nicolas Alhaddad","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nicolas Alhaddad","raw_affiliation_strings":["Boston University"],"affiliations":[{"raw_affiliation_string":"Boston University","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073378468","display_name":"Mayank Varia","orcid":"https://orcid.org/0000-0002-7460-3272"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mayank Varia","raw_affiliation_strings":["Boston University"],"affiliations":[{"raw_affiliation_string":"Boston University","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083734975","display_name":"Ziling Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I157725225","display_name":"University of Illinois Urbana-Champaign","ror":"https://ror.org/047426m28","country_code":"US","type":"education","lineage":["https://openalex.org/I157725225"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ziling Yang","raw_affiliation_strings":["University of Illinois Urbana-Champaign"],"affiliations":[{"raw_affiliation_string":"University of Illinois Urbana-Champaign","institution_ids":["https://openalex.org/I157725225"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5015099918"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":8.9133,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96949882,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"1","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11181","display_name":"Advanced Data Storage Technologies","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/asynchronous-communication","display_name":"Asynchronous communication","score":0.7487014532089233},{"id":"https://openalex.org/keywords/dual","display_name":"Dual (grammatical number)","score":0.641938328742981},{"id":"https://openalex.org/keywords/haven","display_name":"Haven","score":0.6111413240432739},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5874407291412354},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4892153739929199},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3546137809753418},{"id":"https://openalex.org/keywords/art","display_name":"Art","score":0.28177642822265625},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2264120876789093},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.15394535660743713},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.13716557621955872},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.1155988872051239},{"id":"https://openalex.org/keywords/literature","display_name":"Literature","score":0.06852275133132935}],"concepts":[{"id":"https://openalex.org/C151319957","wikidata":"https://www.wikidata.org/wiki/Q752739","display_name":"Asynchronous communication","level":2,"score":0.7487014532089233},{"id":"https://openalex.org/C2780980858","wikidata":"https://www.wikidata.org/wiki/Q110022","display_name":"Dual (grammatical number)","level":2,"score":0.641938328742981},{"id":"https://openalex.org/C2778217808","wikidata":"https://www.wikidata.org/wiki/Q5683658","display_name":"Haven","level":2,"score":0.6111413240432739},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5874407291412354},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4892153739929199},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3546137809753418},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.28177642822265625},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2264120876789093},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.15394535660743713},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.13716557621955872},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.1155988872051239},{"id":"https://openalex.org/C124952713","wikidata":"https://www.wikidata.org/wiki/Q8242","display_name":"Literature","level":1,"score":0.06852275133132935}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.62056/a0qj5w7sf","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a0qj5w7sf","pdf_url":"https://cic.iacr.org/p/1/4/3/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.62056/a0qj5w7sf","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a0qj5w7sf","pdf_url":"https://cic.iacr.org/p/1/4/3/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6100000143051147,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G1413547058","display_name":null,"funder_award_id":"HR0011202002","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G1815435559","display_name":null,"funder_award_id":"1801564","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G2907807980","display_name":null,"funder_award_id":"2209194","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4074910260","display_name":null,"funder_award_id":"Grants No. 1801564, 1915763, 2209194, 2217770, and 2228610","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4161730871","display_name":"MPS-BIO: Collaborative Research: Physical Mechanisms Regulating Sperm Chemotaxis","funder_award_id":"1120200","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4481899174","display_name":"CIVIC-PG Track B: Economic Resiliency through Mechanism Design and Secure Computing: MainStreetPulse: An Early Warning Platform for Monitoring and Supporting Main Street Businesses","funder_award_id":"2228610","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5620015214","display_name":null,"funder_award_id":"Agreement No. HR00112020021","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G5694921277","display_name":"EAGER: SaTC: Early-Stage Interdisciplinary Collaboration: Multi-regulation computation","funder_award_id":"1915763","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G639234436","display_name":null,"funder_award_id":"HR00112020021","funder_id":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency"},{"id":"https://openalex.org/G736507843","display_name":"SaTC: Small: Core: Using Markets to Address Manipulated Information Online","funder_award_id":"2217770","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4406309701.pdf","grobid_xml":"https://content.openalex.org/works/W4406309701.grobid-xml"},"referenced_works_count":42,"referenced_works":["https://openalex.org/W7678451","https://openalex.org/W136358653","https://openalex.org/W1518294377","https://openalex.org/W1528693676","https://openalex.org/W1550901512","https://openalex.org/W1606480398","https://openalex.org/W1728441211","https://openalex.org/W1836078613","https://openalex.org/W1909324101","https://openalex.org/W1988655303","https://openalex.org/W2006699751","https://openalex.org/W2011665720","https://openalex.org/W2033766329","https://openalex.org/W2106004025","https://openalex.org/W2131132597","https://openalex.org/W2138775315","https://openalex.org/W2167882086","https://openalex.org/W2401492698","https://openalex.org/W2473389213","https://openalex.org/W2607261798","https://openalex.org/W2801811971","https://openalex.org/W2883748642","https://openalex.org/W2900186171","https://openalex.org/W2911825405","https://openalex.org/W2963873436","https://openalex.org/W2990120385","https://openalex.org/W3015641482","https://openalex.org/W3106855293","https://openalex.org/W3133452475","https://openalex.org/W3152310355","https://openalex.org/W3189321855","https://openalex.org/W3212043456","https://openalex.org/W3214624280","https://openalex.org/W4286210375","https://openalex.org/W4286503265","https://openalex.org/W4293737217","https://openalex.org/W4385654248","https://openalex.org/W4388857860","https://openalex.org/W4395955755","https://openalex.org/W4395957583","https://openalex.org/W4399395199","https://openalex.org/W4401599477"],"related_works":["https://openalex.org/W1983475890","https://openalex.org/W1984753763","https://openalex.org/W2120625627","https://openalex.org/W2948560023","https://openalex.org/W1988696896","https://openalex.org/W2071326427","https://openalex.org/W2116677773","https://openalex.org/W2213505486","https://openalex.org/W2397935702","https://openalex.org/W2312509974"],"abstract_inverted_index":{"Asynchronous":[0],"complete":[1],"secret":[2,27],"sharing":[3,87],"(ACSS)":[4],"is":[5,125],"a":[6,22,26,29,40,49,85,105,170],"foundational":[7],"primitive":[8],"in":[9,66,84,129],"the":[10,43,67,78,110,130,157,175,187],"design":[11,68],"of":[12,31,39,71,96,112,120,167,177,189,200],"distributed":[13,147],"algorithms":[14],"and":[15,58,63,69,89,115,134,141,182],"cryptosystems":[16],"that":[17,35,55,184],"require":[18],"confidentiality.":[19],"ACSS":[20,51,72,139],"permits":[21],"dealer":[23,79],"to":[24,28,60,80,90,108,145],"distribute":[25],"collection":[30],"N":[32],"servers":[33],"so":[34],"everyone":[36],"holds":[37],"shares":[38],"polynomial":[41],"containing":[42],"dealer's":[44],"secret.":[45],"This":[46],"work":[47,188],"contributes":[48],"new":[50],"protocol,":[52],"called":[53],"Haven++,":[54,178],"uses":[56],"packing":[57],"batching":[59,106],"make":[61],"asymptotic":[62,127],"concrete":[64],"advances":[65],"application":[70,144],"for":[73,138,142,156],"large":[74],"secrets.":[75],"Haven++":[76,154],"allows":[77],"pack":[81],"multiple":[82,118],"secrets":[83],"single":[86],"phase,":[88],"reconstruct":[91],"either":[92],"one":[93],"or":[94],"all":[95],"them":[97],"later.":[98],"For":[99],"even":[100],"larger":[101],"secrets,":[102],"we":[103,179],"contribute":[104],"technique":[107],"amortize":[109],"cost":[111],"proof":[113],"generation":[114],"verification":[116],"across":[117],"invocations":[119],"our":[121],"protocol.":[122],"The":[123],"result":[124],"an":[126,160,198],"improvement":[128],"worst-case":[131],"amortized":[132,164],"communication":[133,165],"computation":[135],"complexity,":[136],"both":[137],"itself":[140],"its":[143],"asynchronous":[146],"key":[148],"generation.":[149],"Our":[150],"ADKG":[151],"based":[152],"on":[153],"achieves,":[155],"first":[158],"time,":[159],"optimal":[161],"worst":[162],"case":[163],"complexity":[166],"\u03baN":[168],"without":[169],"trusted":[171],"setup.":[172],"To":[173],"show":[174],"practicality":[176],"implement":[180],"it":[181,185],"find":[183],"outperforms":[186],"Yurek":[190],"et":[191],"al.":[192],"(NDSS":[193],"2022)":[194],"by":[195],"more":[196],"than":[197],"order":[199],"magnitude":[201],"when":[202],"there":[203],"are":[204],"malicious,":[205],"faulty":[206],"parties.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":4}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
