{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:17:00Z","timestamp":1725837420565},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238289"},{"type":"electronic","value":"9783319238296"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23829-6_28","type":"book-chapter","created":{"date-parts":[[2015,11,7]],"date-time":"2015-11-07T06:06:53Z","timestamp":1446876413000},"page":"405-423","source":"Crossref","is-referenced-by-count":0,"title":["An Information-Theoretic Approach for Secure Protocol Composition"],"prefix":"10.1007","author":[{"given":"Yi-Ting","family":"Chiang","sequence":"first","affiliation":[]},{"given":"Tsan-Sheng","family":"Hsu","sequence":"additional","affiliation":[]},{"given":"Churn-Jung","family":"Liau","sequence":"additional","affiliation":[]},{"given":"Yun-Ching","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Chih-Hao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Da-Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Zhan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,8]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Yao, A.: How to generate and exchange secrets. In: Proceedings of the 27rd Annual IEEE Symposium on Foundations of Computer Science, pp. 162\u2013167, November 1986","DOI":"10.1109\/SFCS.1986.25"},{"key":"28_CR2","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or: a completeness theorem for protocols with honest majority. In: Proceedings of 19th ACM Symposium on Theory of Computing, pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Lindell, Y., Rabin, T.: Information-theoretically secure protocols and security under composition. In: Proceedings of the Thirty-eighth Annual ACM Symposium on Theory of Computing, STOC 2006, pp. 109\u2013118. ACM, New York (2006)","DOI":"10.1145\/1132516.1132532"},{"issue":"2","key":"28_CR4","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/BF00196771","volume":"4","author":"D Beaver","year":"1991","unstructured":"Beaver, D.: Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority. J. Cryptol. 4(2), 75\u2013122 (1991)","journal-title":"J. Cryptol."},{"issue":"6","key":"28_CR5","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1145\/1039488.1039489","volume":"51","author":"C Dwork","year":"2004","unstructured":"Dwork, C., Naor, M., Sahai, A.: Concurrent zero-knowledge. J. ACM 51(6), 851\u2013898 (2004)","journal-title":"J. ACM"},{"key":"28_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","DOI":"10.1007\/b13246","volume-title":"Composition of Secure Multi-Party Protocols: A Comprehensive Study","author":"Y Lindell","year":"2003","unstructured":"Lindell, Y.: Composition of Secure Multi-Party Protocols: A Comprehensive Study. LNCS, vol. 2815. Springer, Heidelberg (2003)"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, FOCS 2001, p. 136. IEEE Computer Society, Washington, D.C. (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"issue":"3","key":"28_CR8","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/1165555.1165570","volume":"37","author":"R Canetti","year":"2006","unstructured":"Canetti, R.: Security and composition of cryptographic protocols: a tutorial (part i). SIGACT News 37(3), 67\u201392 (2006)","journal-title":"SIGACT News"},{"issue":"4","key":"28_CR9","doi-asserted-by":"publisher","first-page":"677","DOI":"10.3233\/JCS-2003-11407","volume":"11","author":"N Durgin","year":"2003","unstructured":"Durgin, N., Mitchell, J., Pavlovic, D.: A compositional logic for proving security properties of protocols. J. Comput. Secur. 11(4), 677\u2013721 (2003)","journal-title":"J. Comput. Secur."},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/j.entcs.2007.02.012","volume":"172","author":"A Datta","year":"2007","unstructured":"Datta, A., Derek, A., Mitchell, J.C., Roy, A.: Protocol composition logic (pcl). Electron. Notes Theoret. Comput. Sci. 172, 311\u2013358 (2007)","journal-title":"Electron. Notes Theoret. Comput. Sci."},{"key":"28_CR11","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13, 143\u2013202 (2000)","journal-title":"J. Cryptol."},{"key":"28_CR12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656","volume-title":"Foundations of Cryptography: Basic Applications","author":"O Goldreich","year":"2004","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2, 1st edn. Cambridge University Press, Cambridge (2004)","edition":"1"},{"key":"28_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611","volume-title":"Elements of Information Theory","author":"TM Cover","year":"1991","unstructured":"Cover, T.M., Thomas, J.A.: Elements of Information Theory. Wiley, New York (1991). Schilling, D.L. (ed.)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160\u2013164, November 1982","DOI":"10.1109\/SFCS.1982.38"},{"key":"28_CR15","unstructured":"Kerschbaum, F., Biswas, D., de Hoogh, S.: Performance comparison of secure comparison protocols. In: 20th International Workshop on Database and Expert Systems Application, 2009, DEXA 2009, pp. 133\u2013136 (2009)"},{"issue":"1","key":"28_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJACT.2008.017048","volume":"1","author":"I Damgard","year":"2008","unstructured":"Damgard, I., Geisler, M., Kroigard, M.: Homomorphic encryption and secure comparison. Int. J. Appl. Cryptogr. 1(1), 22\u201331 (2008)","journal-title":"Int. J. Appl. Cryptogr."},{"issue":"9","key":"28_CR17","doi-asserted-by":"publisher","first-page":"851","DOI":"10.1080\/10020070512331343020","volume":"15","author":"L Shundong","year":"2005","unstructured":"Shundong, L., Yiqi, D., Qiyou, Y.: Secure multi-party computation solution to yao\u2019s millionaires\u2019 problem based on set-inclusion. Prog. Nat. Sci. 15(9), 851\u2013856 (2005)","journal-title":"Prog. Nat. Sci."},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-71677-8_22","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"J Garay","year":"2007","unstructured":"Garay, J., Schoenmakers, B., Villegas, J.: Practical and secure solutions for integer comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330\u2013342. Springer, Heidelberg (2007)"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Zhao, B., Delp, E.J.: Secret sharing in the encrypted domain with secure comparison. In: Global Telecommunications Conference (GLOBECOM 2011), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/icc.2011.5963328"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Kaghazgaran, P., Sadeghyan, B.: Secure two party comparison over encrypted data. In: World Congress on Information and Communication Technologies (WICT 2011), pp. 1123\u20131126 (2011)","DOI":"10.1109\/WICT.2011.6141405"},{"key":"28_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/978-3-642-19379-8_11","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"T Toft","year":"2011","unstructured":"Toft, T.: Sub-linear, secure comparison with two non-colluding parties. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 174\u2013191. Springer, Heidelberg (2011)"},{"key":"28_CR22","doi-asserted-by":"crossref","unstructured":"Shen, C.-H., Zhan, J., Hsu, T.-S., Liau, C.-J., Wang, D.-W.: Scalar-product based secure two-party computation. In: IEEE International Conference on Granular Computing, GrC 2008, pp. 556\u2013561 (2008)","DOI":"10.1109\/GRC.2008.4664775"},{"key":"28_CR23","unstructured":"Du, W., Atallah, M.J.: Privacy-preserving cooperative statistical analysis. In: ACSAC 2001: Proceedings of the 17th Annual Computer Security Applications Conference, pp. 102\u2013110. IEEE Computer Society, Washington, D.C. (2001)"},{"key":"28_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/11535706_9","volume-title":"Data and Applications Security XIX","author":"Y-T Chiang","year":"2005","unstructured":"Chiang, Y.-T., Wang, D.-W., Liau, C.-J., Hsu, T.: Secrecy of two-party secure computation. In: Jajodia, S., Wijesekera, D. (eds.) Data and Applications Security 2005. LNCS, vol. 3654, pp. 114\u2013123. Springer, Heidelberg (2005)"},{"key":"28_CR25","unstructured":"Du, W., Zhan, Z.: Building decision tree classifier on private data. In: Proceedings of the IEEE International Conference on Privacy, Security and Data Mining, CRPIT 2014, pp. 1\u20138. Australian Computer Society Inc., Darlinghurst (2002)"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Du, W., Zhan, J.: A practical approach to solve secure multi-party computation problems. In: Proceedings of New Security Paradigms Workshop, Virginia Beach, Virginia, USA, September 2002","DOI":"10.1145\/844123.844125"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","International Conference on Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23829-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:35:37Z","timestamp":1559306137000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23829-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238289","9783319238296"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23829-6_28","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2015]]}}}