{"id":"https://openalex.org/W4403175009","doi":"https://doi.org/10.62056/ae5w4fe-3","title":"Constant-Round YOSO MPC Without Setup","display_name":"Constant-Round YOSO MPC Without Setup","publication_year":2024,"publication_date":"2024-10-07","ids":{"openalex":"https://openalex.org/W4403175009","doi":"https://doi.org/10.62056/ae5w4fe-3"},"language":"en","primary_location":{"id":"doi:10.62056/ae5w4fe-3","is_oa":true,"landing_page_url":"https://doi.org/10.62056/ae5w4fe-3","pdf_url":"https://cic.iacr.org/p/1/3/30/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/3/30/pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029930457","display_name":"Sebastian Kolby","orcid":"https://orcid.org/0009-0005-3228-7194"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Sebastian Kolby","raw_affiliation_strings":["Aarhus University"],"affiliations":[{"raw_affiliation_string":"Aarhus University","institution_ids":["https://openalex.org/I204337017"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071392609","display_name":"Divya Ravi","orcid":"https://orcid.org/0000-0001-6423-8331"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Divya Ravi","raw_affiliation_strings":["University of Amsterdam"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011493062","display_name":"Sophia Yakoubov","orcid":"https://orcid.org/0000-0001-7958-8537"},"institutions":[{"id":"https://openalex.org/I204337017","display_name":"Aarhus University","ror":"https://ror.org/01aj84f44","country_code":"DK","type":"education","lineage":["https://openalex.org/I204337017"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Sophia Yakoubov","raw_affiliation_strings":["Aarhus University"],"affiliations":[{"raw_affiliation_string":"Aarhus University","institution_ids":["https://openalex.org/I204337017"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5029930457"],"corresponding_institution_ids":["https://openalex.org/I204337017"],"apc_list":null,"apc_paid":null,"fwci":0.719,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.76628227,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9900000095367432,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6231361627578735},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.6100031733512878},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.5964257717132568},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.583060085773468},{"id":"https://openalex.org/keywords/security-parameter","display_name":"Security parameter","score":0.5262945294380188},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.5136651396751404},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.456757128238678},{"id":"https://openalex.org/keywords/leader-election","display_name":"Leader election","score":0.44471243023872375},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.42852669954299927},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.41118961572647095},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3303743600845337},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.32879942655563354},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.32151639461517334},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.3150638937950134},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3093486428260803},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.23155075311660767},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22929415106773376},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20091265439987183}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6231361627578735},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.6100031733512878},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.5964257717132568},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.583060085773468},{"id":"https://openalex.org/C2776711565","wikidata":"https://www.wikidata.org/wiki/Q7445058","display_name":"Security parameter","level":3,"score":0.5262945294380188},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.5136651396751404},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.456757128238678},{"id":"https://openalex.org/C53480672","wikidata":"https://www.wikidata.org/wiki/Q1424189","display_name":"Leader election","level":2,"score":0.44471243023872375},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.42852669954299927},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.41118961572647095},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3303743600845337},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.32879942655563354},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.32151639461517334},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.3150638937950134},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3093486428260803},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.23155075311660767},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22929415106773376},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20091265439987183},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.62056/ae5w4fe-3","is_oa":true,"landing_page_url":"https://doi.org/10.62056/ae5w4fe-3","pdf_url":"https://cic.iacr.org/p/1/3/30/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/1bba382b-70c2-4673-901c-4629b1d4cb6d","is_oa":true,"landing_page_url":"https://pure.au.dk/portal/en/publications/1bba382b-70c2-4673-901c-4629b1d4cb6d","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Kolby, S, Ravi, D & Yakoubov, S 2024, 'Constant-Round YOSO MPC Without Setup', IACR Communications in Cryptology, vol. 1, no. 3. https://doi.org/10.62056/ae5w4fe-3","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"doi:10.62056/ae5w4fe-3","is_oa":true,"landing_page_url":"https://doi.org/10.62056/ae5w4fe-3","pdf_url":"https://cic.iacr.org/p/1/3/30/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4403175009.pdf","grobid_xml":"https://content.openalex.org/works/W4403175009.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W198033559","https://openalex.org/W301822183","https://openalex.org/W1440872534","https://openalex.org/W1499934958","https://openalex.org/W1519947574","https://openalex.org/W1562783580","https://openalex.org/W1571926107","https://openalex.org/W1600010237","https://openalex.org/W1875639526","https://openalex.org/W2025143408","https://openalex.org/W2027471022","https://openalex.org/W2061949491","https://openalex.org/W2088492763","https://openalex.org/W2111276172","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2163257790","https://openalex.org/W2170696315","https://openalex.org/W2794717746","https://openalex.org/W2794956529","https://openalex.org/W2798743856","https://openalex.org/W2808845702","https://openalex.org/W2883285857","https://openalex.org/W2970724878","https://openalex.org/W3038091381","https://openalex.org/W3096450998","https://openalex.org/W3111550222","https://openalex.org/W3141585064","https://openalex.org/W3157694659","https://openalex.org/W3204170102","https://openalex.org/W3207347654","https://openalex.org/W3212299222","https://openalex.org/W3214066202","https://openalex.org/W4312793232","https://openalex.org/W4317928181","https://openalex.org/W4385654341","https://openalex.org/W4385654478","https://openalex.org/W4389028048"],"related_works":["https://openalex.org/W4401352023","https://openalex.org/W1538332662","https://openalex.org/W2610681567","https://openalex.org/W1504470388","https://openalex.org/W4328028453","https://openalex.org/W1493749469","https://openalex.org/W2067596507","https://openalex.org/W2949886604","https://openalex.org/W2000850689","https://openalex.org/W3208655664"],"abstract_inverted_index":{"YOSO":[0,64,98,179,262],"MPC":[1,10,65,99],"(Gentry":[2],"et":[3],"al.,":[4],"Crypto":[5],"2021)":[6],"is":[7,58,83,161,256],"a":[8,53,106,218,225,257],"new":[9],"framework":[11],"where":[12,159],"each":[13],"participant":[14],"can":[15,66,100,123,172],"speak":[16],"at":[17],"most":[18],"once.":[19],"This":[20,255],"models":[21],"an":[22,94],"adaptive":[23],"adversary\u2019s":[24,80],"ability":[25],"to":[26,46,52,175,215,234,247,252,260],"watch":[27],"the":[28,60,70,79,132,162,166,206,243,248],"network":[29],"and":[30,139,143],"corrupt":[31],"or":[32],"destroy":[33],"parties":[34,233],"it":[35,171,200,210],"deems":[36],"significant":[37],"based":[38],"on":[39,113,264],"their":[40],"communication.":[41],"By":[42],"using":[43],"private":[44,236],"channels":[45],"anonymous":[47,253],"receivers":[48],"(e.g.":[49,87],"by":[50,184],"encrypting":[51],"public":[54],"key":[55],"whose":[56],"owner":[57],"unknown),":[59],"communication":[61],"complexity":[62],"of":[63,74,109,146,165,220],"scale":[67],"sublinearly":[68],"with":[69],"total":[71],"number":[72,108],"N":[73,86],"available":[75],"parties,":[76],"even":[77],"when":[78],"corruption":[81],"threshold":[82],"linear":[84],"in":[85,105,242,250],"just":[88],"under":[89],"N/2).":[90],"It":[91],"was":[92],"previously":[93],"open":[95],"problem":[96],"whether":[97],"achieve":[101],"guaranteed":[102],"output":[103],"delivery":[104],"constant":[107],"rounds":[110,145,194],"without":[111],"relying":[112],"trusted":[114],"setup.":[115],"In":[116],"this":[117,122],"work,":[118],"we":[119,136,153,223],"show":[120],"that":[121,181,186],"indeed":[124],"be":[125,173,202],"accomplished.":[126],"We":[127],"demonstrate":[128],"three":[129,144],"different":[130],"approaches:":[131],"first":[133,197],"two":[134,142,198],"(which":[135,152],"call":[137,154],"YaOSO":[138],"YOSO-GLS)":[140],"use":[141],"communication,":[147],"respectively.":[148],"Our":[149],"third":[150],"approach":[151],"YOSO-LHSS)":[155],"uses":[156],"O(d)":[157],"rounds,":[158],"d":[160],"multiplicative":[163],"depth":[164],"circuit":[167],"being":[168],"evaluated;":[169],"however,":[170],"used":[174],"bootstrap":[176],"any":[177],"constant-round":[178],"protocol":[180,249],"requires":[182,192],"setup,":[183],"generating":[185],"setup":[187],"within":[188],"YOSO-LHSS.":[189],"Though":[190],"YOSO-LHSS":[191],"more":[193,203,213],"than":[195],"our":[196],"approaches,":[199],"may":[201],"practical,":[204],"since":[205],"zero":[207],"knowledge":[208],"proofs":[209],"employs":[211],"are":[212,239],"efficient":[214],"instantiate.":[216],"As":[217],"contribution":[219],"independent":[221],"interest,":[222],"introduce":[224],"verifiable":[226],"state":[227],"propagation":[228],"UC":[229],"functionality,":[230],"which":[231,238],"allows":[232],"send":[235],"message":[237],"verifiably":[240],"derived":[241],"\u201ccorrect\u201d":[244],"way":[245],"(according":[246],"question)":[251],"receivers.":[254],"natural":[258],"functionality":[259],"build":[261],"protocols":[263],"top":[265],"of.":[266]},"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-03-12T06:13:28.667946","created_date":"2025-10-10T00:00:00"}
