{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:40:08Z","timestamp":1744206008882,"version":"3.40.3"},"publisher-location":"Cham","reference-count":70,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031875403","type":"print"},{"value":"9783031875410","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87541-0_2","type":"book-chapter","created":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T12:59:28Z","timestamp":1744203568000},"page":"17-30","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The Vision of\u00a0Secure Multi-party Computation Technical Standards"],"prefix":"10.1007","author":[{"given":"Jingqiang","family":"Lin","sequence":"first","affiliation":[]},{"given":"Zhiquan","family":"Gao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,10]]},"reference":[{"key":"2_CR1","unstructured":"Ali, A., Lepoint, T., Patel, S., Raykova, M., Schoppmann, P., Seth, K., Yeo, K.: Communication-computation trade-offs in PIR. In: 30th USENIX Security Symposium. pp. 1811\u20131828 (2021)"},{"key":"2_CR2","unstructured":"Amazon Web Services (AWS): AWS key management service. https:\/\/aws.amazon.com\/kms\/"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Angel, S., Chen, H., Laine, K., Setty, S.: PIR with compressed queries and amortized query processing. In: 39th IEEE Symposium on Security and Privacy (S &P). pp. 962\u2013979 (2018)","DOI":"10.1109\/SP.2018.00062"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Asharov, G., Lindell, Y., Schneider, T., Zohner, M.: More efficient oblivious transfer extensions with security for malicious adversaries. In: Advances in Cryptology - EUROCRYPT. pp. 673\u2013701 (2015)","DOI":"10.1007\/978-3-662-46800-5_26"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Advances in Cryptology - CRYPTO. pp. 420\u2013432 (1991)","DOI":"10.1007\/3-540-46766-1_34"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation. In: 20th Annual ACM Symposium on Theory of Computing (STOC). pp. 1\u201310 (1988)","DOI":"10.1145\/62212.62213"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: A framework for fast privacy-preserving computations. In: 13th European Symposium on Research in Computer Security (ESORICS). pp. 192\u2013206 (2008)","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gennaro, R., Goldfeder, S., Jain, A., Kim, S., Rasmussen, P., Sahai, A.: Threshold cryptosystems from threshold fully homomorphic encryption. In: Advances in Cryptology - CRYPTO. pp. 565\u2013596 (2018)","DOI":"10.1007\/978-3-319-96884-1_19"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Boyle, E., Couteau, G., Gilboa, N., Ishai, Y.: Compressing vector OLE. In: 26th ACM Conference on Computer and Communications Security (CCS). pp. 896\u2013912 (2019)","DOI":"10.1145\/3243734.3243868"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Boyle, E., Couteau, G., Gilboa, N., Ishai, Y., Kohl, L., Rindal, P., Scholl, P.: Efficient two-round OT extension and silent non-interactive secure computation. In: 26th ACM Conference on Computer and Communications Security (CCS). pp. 291\u2013308 (2019)","DOI":"10.1145\/3319535.3354255"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) Fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory 6(3), 13:1\u201313:36 (2014)","DOI":"10.1145\/2633600"},{"key":"2_CR12","unstructured":"Chartered Professional Accountants of Canada (CPA Canada): WebTrust principles and criteria for certification authorities (2021)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Chen, H., Chillotti, I., Song, Y.: Multi-key homomorphic encryption from TFHE. In: Advances in Cryptology - ASIACRYPT. pp. 446\u2013472 (2019)","DOI":"10.1007\/978-3-030-34621-8_16"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Chen, H., Dai, W., Kim, M., Song, Y.: Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference. In: 26th ACM Conference on Computer and Communications Security (CCS). pp. 395\u2013412 (2019)","DOI":"10.1145\/3319535.3363207"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhang, Z., Wang, X.: Batched multi-hop multi-key FHE from Ring-LWE with compact ciphertext extension. In: 15th International Conference on Theory of Cryptography (TCC) (2017)","DOI":"10.1007\/978-3-319-70503-3_20"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.S.: Homomorphic encryption for arithmetic of approximate numbers. In: Advances in Cryptology - ASIACRYPT. pp. 409\u2013437 (2017)","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabachene, M.: Faster fully homomorphic encryption: Bootstrapping in less than 0.1 seconds. In: Advances in Cryptology - ASIACRYPT. pp. 3\u201333 (2016)","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Choi, S.G., Katz, J., Malozemoff, A., Zikas, V.: Efficient three-party computation from Cut-and-Choose. In: Advances in Cryptology - CRYPTO. pp. 513\u2013530 (2014)","DOI":"10.1007\/978-3-662-44381-1_29"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Cong, K., Moreno, R., da\u00a0Gama, M., Dai, W., Iliashenko, I., Laine, K., Rosenberg, M.: Labeled PSI from homomorphic encryption with reduced computation and communication. In: 28th ACM Conference on Computer and Communications Security (CCS). pp. 1135\u20131150 (2021)","DOI":"10.1145\/3460120.3484760"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Corrigan-Gibbs, H., Henzinger, A., Kogan, D.: Single-server private information retrieval with sublinear amortized time. In: Advances in Cryptology - EUROCRYPT. pp. 3\u201333 (2022)","DOI":"10.1007\/978-3-031-07085-3_1"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Corrigan-Gibbs, H., Kogan, D.: Private information retrieval with sublinear online time. In: Advances in Cryptology - EUROCRYPT. pp. 44\u201375 (2020)","DOI":"10.1007\/978-3-030-45721-1_3"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Damgard, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Advances in Cryptology - CRYPTO. pp. 643\u2013662 (2012)","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"2_CR23","unstructured":"European Telecommunications Standards Institute (ETSI): ETSI EN 319 401: Electronic signatures and infrastructures (ESI) \u2013 General policy requirements for trust service providers, v2.2.1 (2018)"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Frederiksen, T., Jakobsen, T., Nielsen, J., Nordholt, P., Orlandi, C.: MiniLEGO: Efficient secure two-party computation from general assumptions. In: Advances in Cryptology - EUROCRYPT. pp. 537\u2013556 (2013)","DOI":"10.1007\/978-3-642-38348-9_32"},{"key":"2_CR25","unstructured":"Henzinger, A., Hong, M., Corrigan-Gibbs, H., Meiklejohn, S., Vaikuntanathan, V.: One server for the price of two: Simple and fast single-server private information retrieval. In: 32nd USENIX Security Symposium. pp. 3889\u20133905 (2023)"},{"key":"2_CR26","unstructured":"Institute of Electrical and Electronics Engineers (IEEE): P2842: Recommended practice for secure multi-party computation (2021)"},{"key":"2_CR27","unstructured":"International Organization for Standardization (ISO): ISO\/IEC 19790: Information technology \u2013 Security techniques \u2013 Security requirements for cryptographic modules (2012)"},{"key":"2_CR28","unstructured":"International Organization for Standardization (ISO): ISO\/IEC 4922-1:2023 Information security \u2013 Secure multiparty computation Part 1: General (2023)"},{"key":"2_CR29","unstructured":"International Organization for Standardization (ISO): ISO\/IEC 4922-2:2024 Information security \u2013 Secure multiparty computation Part 2: Mechanisms based on secret sharing (2024)"},{"key":"2_CR30","unstructured":"International Organization for Standardization (ISO): ISO\/IEC 4922-3 Information security \u2013 Secure multiparty computation Part 3: Mechanisms based on garbled circuits (Under development) (2024)"},{"key":"2_CR31","unstructured":"Internet Engineering Task Force (IETF): RFC 2818: HTTP over TLS (2000)"},{"key":"2_CR32","unstructured":"Internet Engineering Task Force (IETF): RFC 3161: Internet X.509 public key infrastructure time-stamp protocol (TSP) (2001)"},{"key":"2_CR33","unstructured":"Internet Engineering Task Force (IETF): RFC 8446: The transport layer security (TLS) protocol version 1.3 (2018)"},{"key":"2_CR34","unstructured":"Internet Engineering Task Force (IETF): RFC 8551: Secure\/Multipurpose internet mail extensions (S\/MIME) version 4.0 message specification (2019)"},{"key":"2_CR35","unstructured":"Internet Engineering Task Force (IETF): RFC 9000: QUIC - A UDP-based multiplexed and secure transport (2021)"},{"key":"2_CR36","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kilian, J., Nissim, K., Petrank, E.: Extending oblivious transfers efficiently. In: Advances in Cryptology - CRYPTO. pp. 145\u2013161 (2003)","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"2_CR37","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Kiayias, A., Krawczyk, H.: Round-optimal password-protected secret sharing and T-PAKE in the password-only model. In: Advances in Cryptology - ASIACRYPT. pp. 233\u2013253 (2014)","DOI":"10.1007\/978-3-662-45608-8_13"},{"key":"2_CR38","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V., Kumaresan, R., Rosulek, M., Trieu, N.: Efficient batched oblivious PRF with applications to private set intersection. In: 23rd ACM Conference on Computer and Communications Security (CCS). pp. 818\u2013829 (2016)","DOI":"10.1145\/2976749.2978381"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V., Mohassel, P., Rosulek, M.: FleXOR: Flexible garbling for XOR gates that beats Free-XOR. In: Advances in Cryptology - CRYPTO. pp. 440\u2013457 (2014)","DOI":"10.1007\/978-3-662-44381-1_25"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V., Rosulek, M., Trieu, N., Wang, X.: Scalable private set union from symmetric-key techniques. In: Advances in Cryptology - ASIACRYPT. pp. 636\u2013666 (2019)","DOI":"10.1007\/978-3-030-34621-8_23"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V., Schneider, T.: Improved garbled circuit: Free XOR gates and applications. In: 35th International Colloquium on Automata, Languages and Programming (ICALP). pp. 486\u2013498 (2008)","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Li, Y., Xu, W.: PrivPy: General and scalable privacy-preserving data mining. In: 25th ACM International Conference on Knowledge Discovery & Data Mining (KDD). pp. 1299\u20131307 (2019)","DOI":"10.1145\/3292500.3330920"},{"key":"2_CR43","doi-asserted-by":"crossref","unstructured":"Meadows, C.: A more efficient cryptographic matchmaking protocol for use in the absence of a continuously available third party. In: 7th IEEE Symposium on Security and Privacy (S &P). pp. 134\u2013137 (1986)","DOI":"10.1109\/SP.1986.10022"},{"key":"2_CR44","unstructured":"Microsoft Corporate: Cryptography API: Next generation. https:\/\/learn.microsoft.com\/en-us\/windows\/win32\/seccng\/cng-portal"},{"key":"2_CR45","unstructured":"Microsoft Corporate: Key management in Azure. https:\/\/learn.microsoft.com\/en-us\/azure\/security\/fundamentals\/key-management"},{"key":"2_CR46","unstructured":"Mohassel, P., Rindal, P.: ABY3: A mixed protocol framework for machine learning. In: 25th ACM Conference on Computer and Communications Security (CCS). pp. 35\u201352 (2018)"},{"key":"2_CR47","unstructured":"Mozilla Foundation: Mozilla root store policy, version 2.9 (2023)"},{"issue":"2","key":"2_CR48","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1145\/972639.972643","volume":"51","author":"M Naor","year":"2004","unstructured":"Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2), 231\u2013262 (2004)","journal-title":"J. ACM"},{"key":"2_CR49","unstructured":"National Institute of Standards and Technology (NIST): Multi-party threshold cryptography. https:\/\/csrc.nist.gov\/Projects\/threshold-cryptography"},{"key":"2_CR50","unstructured":"National Institute of Standards and Technology (NIST): FIPS 140-2: Security requirements for cryptographic modules (2001)"},{"key":"2_CR51","unstructured":"OpenID Foundation: OpenID Connect Core 1.0 (2023)"},{"key":"2_CR52","unstructured":"OpenSSL Foundation: OpenSSL Documentation 3.0. https:\/\/docs.openssl.org\/master\/"},{"key":"2_CR53","unstructured":"Oracle Corporate: Java cryptography architecture (JCA) reference guide (2024)"},{"key":"2_CR54","unstructured":"Organization for the Advancement of Structured Information Standards (OASIS): PKCS #11 Cryptographic token interface base specification version 3.0 (2020)"},{"key":"2_CR55","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Advances in Cryptology - EUROCRYPT. pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"2_CR56","doi-asserted-by":"crossref","unstructured":"Pedersen, T.: A threshold cryptosystem without a trusted party. In: Advances in Cryptology - EUROCRYPT. pp. 522\u2013526 (1991)","DOI":"10.1007\/3-540-46416-6_47"},{"key":"2_CR57","doi-asserted-by":"crossref","unstructured":"Peikert, C., Shiehian, S.: Multi-key FHE from LWE, Revisited. In: 14th International Conference on Theory of Cryptography (TCC). pp. 217\u2013238 (2016)","DOI":"10.1007\/978-3-662-53644-5_9"},{"key":"2_CR58","doi-asserted-by":"crossref","unstructured":"Raghuraman, S., Rindal, P.: Blazing fast PSI from improved OKVS and subfield VOLE. In: 29th ACM Conference on Computer and Communications Security (CCS). pp. 2505\u20132517 (2022)","DOI":"10.1145\/3548606.3560658"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Rindal, P., Schoppmann, P.: VOLE-PSI: Fast OPRF and circuit-PSI from vector-OLE. In: Advances in Cryptology - EUROCRYPT. pp. 901\u2013930 (2021)","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"2_CR60","unstructured":"Standardization Administration of China: GB\/T 38636-2020: Information security technology \u2013 Transport layer cryptography protocol (TLCP) (2020)"},{"key":"2_CR61","unstructured":"Telecommunication Standardization Sector of ITU (ITU-T): Recommendation X.509: Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks (2019)"},{"key":"2_CR62","unstructured":"Telecommunication Standardization Sector of ITU (ITU-T): Recommendation X.1770: Technical guidelines for secure multi-party computation (2021)"},{"key":"2_CR63","doi-asserted-by":"crossref","unstructured":"Tu, B., Chen, Y., Liu, Q., Zhang, C.: Fast unbalanced private set union from fully homomorphic encryption. In: 30th ACM Conference on Computer and Communications Security (CCS). pp. 2959\u20132973 (2023)","DOI":"10.1145\/3576915.3623064"},{"issue":"3","key":"2_CR64","doi-asserted-by":"publisher","first-page":"26","DOI":"10.2478\/popets-2019-0035","volume":"2019","author":"S Wagh","year":"2019","unstructured":"Wagh, S., Gupta, D., Chandran, N.: SecureNN: 3-party secure computation for neural network training. Proceedings on Privacy Enhancing Technologies (PETS) 2019(3), 26\u201349 (2019)","journal-title":"Proceedings on Privacy Enhancing Technologies (PETS)"},{"key":"2_CR65","doi-asserted-by":"crossref","unstructured":"Wang, X., Ranellucci, S., Katz, J.: Authenticated garbling and efficient maliciously secure two-party computation. In: 24th ACM Conference on Computer and Communications Security (CCS). pp. 21\u201337 (2017)","DOI":"10.1145\/3133956.3134053"},{"key":"2_CR66","doi-asserted-by":"crossref","unstructured":"Wang, X., Ranellucci, S., Katz, J.: Global-scale secure multiparty computation. In: 24th ACM Conference on Computer and Communications Security (CCS). pp. 39\u201356 (2017)","DOI":"10.1145\/3133956.3133979"},{"key":"2_CR67","doi-asserted-by":"crossref","unstructured":"Yao, A.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (FOCS). pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"2_CR68","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (FOCS). pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"2_CR69","doi-asserted-by":"crossref","unstructured":"Zahur, S., Rosulek, M., Evans, D.: Two halves make a whole - Reducing data transfer in garbled circuits using half gates. In: Advances in Cryptology - EUROCRYPT. pp. 220\u2013250 (2015)","DOI":"10.1007\/978-3-662-46803-6_8"},{"key":"2_CR70","unstructured":"Zhang, C., Chen, Y., Liu, W., Zhang, M., Lin, D.: Linear private set union from multi-query reverse private membership test. In: 32nd USENIX Security Symposium. pp. 337\u2013354 (2023)"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87541-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:00:40Z","timestamp":1744203640000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87541-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031875403","9783031875410"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87541-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"10 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research in Security Standardisation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kunming","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ssr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ssresearch24.github.io\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}