{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:57:10Z","timestamp":1771473430933,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":39,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819780129","type":"print"},{"value":"9789819780136","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T00:00:00Z","timestamp":1727827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T00:00:00Z","timestamp":1727827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-97-8013-6_3","type":"book-chapter","created":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T09:02:02Z","timestamp":1727859722000},"page":"49-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["MaSTer: Maliciously Secure Truncation for\u00a0Replicated Secret Sharing Without Pre-processing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0831-8123","authenticated-orcid":false,"given":"Martin","family":"Zbudila","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8871-8532","authenticated-orcid":false,"given":"Erik","family":"Pohle","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5128-3608","authenticated-orcid":false,"given":"Aysajan","family":"Abidin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2005-9651","authenticated-orcid":false,"given":"Bart","family":"Preneel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,2]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Araki, T., Furukawa, J., Lindell, Y., Nof, A., Ohara, K.: High-throughput semi-honest secure three-party computation with an honest majority. In: Weippl, E.R., Katzenbeisser, S., Kruegel, C., Myers, A.C., Halevi, S. (eds.) Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24\u201328 October 2016, pp. 805\u2013817. ACM, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2976749.2978331","DOI":"10.1145\/2976749.2978331"},{"key":"3_CR2","doi-asserted-by":"publisher","unstructured":"Attrapadung, N., et al.: Adam in private: secure and fast training of deep neural networks with adaptive moment estimation. Proc. Priv. Enhancing Technol. 2022(4), 746\u2013767 (2022). https:\/\/doi.org\/10.56553\/popets-2022-0131","DOI":"10.56553\/popets-2022-0131"},{"key":"3_CR3","doi-asserted-by":"publisher","unstructured":"Baccarini, A.N., Blanton, M., Yuan, C.: Multi-party replicated secret sharing over a ring with applications to privacy-preserving machine learning. Proc. Priv. Enhancing Technol. 2023(1), 608\u2013626 (2023). https:\/\/doi.org\/10.56553\/popets-2023-0035","DOI":"10.56553\/popets-2023-0035"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/3-540-46766-1_34","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201991","author":"D Beaver","year":"1992","unstructured":"Beaver, D.: Efficient multiparty protocols using circuit randomization. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 420\u2013432. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_34"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422-426 (1970). https:\/\/doi.org\/10.1145\/362686.362692","DOI":"10.1145\/362686.362692"},{"issue":"s1","key":"3_CR6","first-page":"317","volume":"40","author":"R Bousseljot","year":"1995","unstructured":"Bousseljot, R., Kreiseler, D., Schnabel, A.: Nutzung der EKG-Signaldatenbank CARDIODAT der PTB \u00fcber das Internet. Biomed. Eng.\/Biomedizinische Technik 40(s1), 317\u2013318 (1995)","journal-title":"Biomed. Eng.\/Biomedizinische Technik"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science. FOCS 2001, 14\u201317 October 2001, pp. 136\u2013145. IEEE Computer Society (2001). https:\/\/doi.org\/10.1109\/SFCS.2001.959888","DOI":"10.1109\/SFCS.2001.959888"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-48000-7_1","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"R Canetti","year":"2015","unstructured":"Canetti, R., Cohen, A., Lindell, Y.: A simpler variant of universally composable security for standard multiparty computation. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 3\u201322. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48000-7_1"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-642-15317-4_13","volume-title":"Security and Cryptography for Networks","author":"O Catrina","year":"2010","unstructured":"Catrina, O., de Hoogh, S.: Improved primitives for secure multiparty integer computation. In: Garay, J.A., De Prisco, R. (eds.) SCN 2010. LNCS, vol. 6280, pp. 182\u2013199. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15317-4_13"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Chaudhari, H., Choudhury, A., Patra, A., Suresh, A.: ASTRA: High throughput 3PC over rings with application to secure prediction. In: Sion, R., Papamanthou, C. (eds.) Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop. CCSW@CCS 2019, 11 November 2019, pp. 81\u201392. ACM (2019). https:\/\/doi.org\/10.1145\/3338466.3358922","DOI":"10.1145\/3338466.3358922"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Chaudhari, H., Rachuri, R., Suresh, A.: Trident: efficient 4pc framework for privacy preserving machine learning. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 23\u201326 February 2020. The Internet Society (2020). https:\/\/www.ndss-symposium.org\/ndss-paper\/trident-efficient-4pc-framework-for-privacy-preserving-machine-learning\/","DOI":"10.14722\/ndss.2020.23005"},{"key":"3_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/978-3-319-96881-0_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2018","author":"R Cramer","year":"2018","unstructured":"Cramer, R., Damg\u00e5rd, I., Escudero, D., Scholl, P., Xing, C.: SPD$$\\mathbb{Z}_{2^k}$$: efficient MPC mod $$2^k$$ for dishonest majority. In: Shacham, H., Boldyreva, A. (eds.) CRYPTO 2018. LNCS, vol. 10992, pp. 769\u2013798. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96881-0_26"},{"issue":"4","key":"3_CR13","doi-asserted-by":"publisher","first-page":"355","DOI":"10.2478\/popets-2020-0077","volume":"2020","author":"APK Dalskov","year":"2020","unstructured":"Dalskov, A.P.K., Escudero, D., Keller, M.: Secure evaluation of quantized neural networks. Proc. Priv. Enhancing Technol. 2020(4), 355\u2013375 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0077","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"3_CR14","unstructured":"Dalskov, A.P.K., Escudero, D., Keller, M.: Fantastic four: honest-majority four-party secure computation with malicious security. In: Bailey, M., Greenstadt, R. (eds.) 30th USENIX Security Symposium, USENIX Security 2021, 11\u201313 August 2021, pp. 2183\u20132200. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/dalskov"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/978-3-030-56880-1_29","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"D Escudero","year":"2020","unstructured":"Escudero, D., Ghosh, S., Keller, M., Rachuri, R., Scholl, P.: Improved primitives for MPC over mixed arithmetic-binary circuits. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12171, pp. 823\u2013852. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_29"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-3-319-56614-6_8","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2017","author":"J Furukawa","year":"2017","unstructured":"Furukawa, J., Lindell, Y., Nof, A., Weinstein, O.: High-throughput secure three-party computation for malicious adversaries and an honest majority. In: Coron, J.-S., Nielsen, J.B. (eds.) EUROCRYPT 2017, Part II. LNCS, vol. 10211, pp. 225\u2013255. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-56614-6_8"},{"issue":"23","key":"3_CR17","doi-asserted-by":"publisher","first-page":"E215","DOI":"10.1161\/01.CIR.101.23.e215","volume":"101","author":"AL Goldberger","year":"2000","unstructured":"Goldberger, A.L., et al.: Physiobank, physiotoolkit, and physionet: components of a new research resource for complex physiologic signals. Circulation 101(23), E215-20 (2000)","journal-title":"Circulation"},{"key":"3_CR18","unstructured":"Gupta, K., et al.: SIGMA: secure GPT inference with function secret sharing. IACR Cryptology ePrint Archive, p.\u00a01269 (2023). https:\/\/eprint.iacr.org\/2023\/1269"},{"key":"3_CR19","doi-asserted-by":"publisher","unstructured":"Gupta, K., Kumaraswamy, D., Chandran, N., Gupta, D.: Llama: a low latency math library for secure inference. Proc. Priv. Enhancing Technol. 2022(4), 274\u2013294 (2022). https:\/\/doi.org\/10.56553\/popets-2022-0109","DOI":"10.56553\/popets-2022-0109"},{"key":"3_CR20","unstructured":"Huang, Z., Lu, W., Hong, C., Ding, J.: Cheetah: lean and fast secure two-party deep neural network inference. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, 10\u201312 August 2022, pp. 809\u2013826. USENIX Association (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/huang-zhicong"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Kachuee, M., Fazeli, S., Sarrafzadeh, M.: ECG heartbeat classification: a deep transferable representation. CoRR abs\/1805.00794 (2018). http:\/\/arxiv.org\/abs\/1805.00794","DOI":"10.1109\/ICHI.2018.00092"},{"key":"3_CR22","doi-asserted-by":"publisher","unstructured":"Keller, M.: MP-SPDZ: a versatile framework for multi-party computation. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, 9\u201313 November 2020, pp. 1575\u20131590. ACM (2020). https:\/\/doi.org\/10.1145\/3372297.3417872","DOI":"10.1145\/3372297.3417872"},{"key":"3_CR23","unstructured":"Koti, N., Pancholi, M., Patra, A., Suresh, A.: SWIFT: super-fast and robust privacy-preserving machine learning. In: Bailey, M., Greenstadt, R. (eds.) 30th USENIX Security Symposium, USENIX Security 2021, 11\u201313 August 2021, pp. 2651\u20132668. USENIX Association (2021). https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/koti"},{"key":"3_CR24","unstructured":"Krizhevsky, A., Sutskever, I., Hinton, G.E.: Imagenet classification with deep convolutional neural networks. In: Bartlett, P.L., Pereira, F.C.N., Burges, C.J.C., Bottou, L., Weinberger, K.Q. (eds.) Advances in Neural Information Processing Systems 25: 26th Annual Conference on Neural Information Processing Systems 2012. Proceedings of a meeting held 3\u20136 December 2012, pp. 1106\u20131114 (2012). https:\/\/proceedings.neurips.cc\/paper\/2012\/hash\/c399862d3b9d6b76c8436e924a68c45b-Abstract.html"},{"issue":"11","key":"3_CR25","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y LeCun","year":"1998","unstructured":"LeCun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"},{"key":"3_CR26","unstructured":"Li, Y., Duan, Y., Huang, Z., Hong, C., Zhang, C., Song, Y.: Efficient 3PC for binary circuits with application to maliciously-secure DNN inference. In: Calandrino, J.A., Troncoso, C. (eds.) 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, 9\u201311 August 2023. USENIX Association (2023). https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/li-yun"},{"key":"3_CR27","doi-asserted-by":"publisher","unstructured":"Mitzenmacher, M.: Compressed bloom filters. In: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing. PODC \u201901, pp. 144\u2013150. Association for Computing Machinery, New York, NY, USA (2001). https:\/\/doi.org\/10.1145\/383962.384004","DOI":"10.1145\/383962.384004"},{"key":"3_CR28","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Rindal, P.: ABY$$ ^{\\text{3}}$$: a mixed protocol framework for machine learning. In: Lie, D., Mannan, M., Backes, M., Wang, X. (eds.) Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. CCS 2018, Toronto, ON, Canada, 15\u201319 October 2018, pp. 35\u201352. ACM (2018). https:\/\/doi.org\/10.1145\/3243734.3243760","DOI":"10.1145\/3243734.3243760"},{"key":"3_CR29","doi-asserted-by":"publisher","unstructured":"Mohassel, P., Zhang, Y.: SecureML: a system for scalable privacy-preserving machine learning. In: 2017 IEEE Symposium on Security and Privacy. SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 19\u201338. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.12","DOI":"10.1109\/SP.2017.12"},{"issue":"3","key":"3_CR30","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/51.932724","volume":"20","author":"GB Moody","year":"2001","unstructured":"Moody, G.B., Mark, R.G.: The impact of the mit-bih arrhythmia database. IEEE Eng. Med. Biol. Mag. 20(3), 45\u201350 (2001)","journal-title":"IEEE Eng. Med. Biol. Mag."},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Patra, A., Suresh, A.: BLAZE: blazing fast privacy-preserving machine learning. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, 23\u201326 February 2020. The Internet Society (2020). https:\/\/www.ndss-symposium.org\/ndss-paper\/blaze-blazing-fast-privacy-preserving-machine-learning\/","DOI":"10.14722\/ndss.2020.24202"},{"key":"3_CR32","doi-asserted-by":"publisher","unstructured":"Rathee, D., et al.: CrypTFlow2: practical 2-party secure inference. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) CCS \u201920: 2020 ACM SIGSAC Conference on Computer and Communications Security, 9\u201313 November 2020, pp. 325\u2013342. ACM (2020). https:\/\/doi.org\/10.1145\/3372297.3417274","DOI":"10.1145\/3372297.3417274"},{"key":"3_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-35423-7_12","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2019","author":"D Rotaru","year":"2019","unstructured":"Rotaru, D., Wood, T.: MArBled circuits: mixing arithmetic and boolean circuits with active security. In: Hao, F., Ruj, S., Sen Gupta, S. (eds.) INDOCRYPT 2019. LNCS, vol. 11898, pp. 227\u2013249. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-35423-7_12"},{"issue":"1","key":"3_CR34","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1109\/SURV.2011.031611.00024","volume":"14","author":"S Tarkoma","year":"2012","unstructured":"Tarkoma, S., Rothenberg, C.E., Lagerspetz, E.: Theory and practice of bloom filters for distributed systems. IEEE Commun. Surv. Tutor. 14(1), 131\u2013155 (2012). https:\/\/doi.org\/10.1109\/SURV.2011.031611.00024","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"3_CR35","doi-asserted-by":"publisher","first-page":"188","DOI":"10.2478\/popets-2021-0011","volume":"2021","author":"S Wagh","year":"2021","unstructured":"Wagh, S., Tople, S., Benhamouda, F., Kushilevitz, E., Mittal, P., Rabin, T.: Falcon: honest-majority maliciously secure framework for private deep learning. Proc. Priv. Enhancing Technol. 2021(1), 188\u2013208 (2021). https:\/\/doi.org\/10.2478\/popets-2021-0011","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"3_CR36","unstructured":"Watson, J., Wagh, S., Popa, R.A.: Piranha: a GPU platform for secure computation. In: Butler, K.R.B., Thomas, K. (eds.) 31st USENIX Security Symposium, USENIX Security 2022, 10\u201312 August 2022, pp. 827\u2013844. USENIX Association (2022). https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/watson"},{"key":"3_CR37","unstructured":"Zbudila, M., Pohle, E., Abidin, A., Preneel, B.: MaSTer: maliciously secure truncation for replicated secret sharing without pre-processing. Cryptology ePrint Archive, Paper 2024\/1026 (2024). https:\/\/eprint.iacr.org\/2024\/1026"},{"key":"3_CR38","doi-asserted-by":"publisher","unstructured":"Zhou, L., Song, Q., Zhang, S., Wang, Z., Wang, X., Li, Y.: Bicoptor 2.0: addressing challenges in probabilistic truncation for enhanced privacy-preserving machine learning. CoRR abs\/2309.04909 (2023). https:\/\/doi.org\/10.48550\/ARXIV.2309.04909","DOI":"10.48550\/ARXIV.2309.04909"},{"key":"3_CR39","doi-asserted-by":"crossref","unstructured":"Zou, H., Xiao, Y., Zhang, R.: Semi-honest 2-party faithful truncation from two-bit extraction. IACR Cryptology ePrint Archive, p.\u00a01159 (2023), https:\/\/eprint.iacr.org\/2023\/1159","DOI":"10.1007\/978-981-99-7356-9_13"}],"container-title":["Lecture Notes in Computer Science","Cryptology and Network Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-8013-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,2]],"date-time":"2024-10-02T09:02:38Z","timestamp":1727859758000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-8013-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,2]]},"ISBN":["9789819780129","9789819780136"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-8013-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,2]]},"assertion":[{"value":"2 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CANS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Network Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cans2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.cansconference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}