{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:13:58Z","timestamp":1775470438040,"version":"3.50.1"},"reference-count":43,"publisher":"Oxford University Press (OUP)","license":[{"start":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T00:00:00Z","timestamp":1536710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1093\/comjnl\/bxy090","type":"journal-article","created":{"date-parts":[[2018,8,2]],"date-time":"2018-08-02T11:24:13Z","timestamp":1533209053000},"source":"Crossref","is-referenced-by-count":66,"title":["From Keys to Databases\u2014Real-World Applications of Secure Multi-Party Computation"],"prefix":"10.1093","author":[{"given":"David W","family":"Archer","sequence":"first","affiliation":[{"name":"Galois Inc, 421 SW 6th Ave #300, Portland, OR, USA"}]},{"given":"Dan","family":"Bogdanov","sequence":"additional","affiliation":[{"name":"Cybernetica AS, M\u00e4ealuse 2\/1, Tallinn, Estonia"}]},{"given":"Yehuda","family":"Lindell","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Bar-Ilan University, Ramat Gan 52900, Israel and Unbound Tech, 25 Efal Beit Amot Platinum, Petach Tikva, Israel"}]},{"given":"Liina","family":"Kamm","sequence":"additional","affiliation":[{"name":"Cybernetica AS, M\u00e4ealuse 2\/1, Tallinn, Estonia"}]},{"given":"Kurt","family":"Nielsen","sequence":"additional","affiliation":[{"name":"Partisia ApS, Aabogade 15, Aarhus N, Denmark"},{"name":"Sepior ApS, Inge Lehmanns Gade 10, Aarhus C, Denmark"}]},{"given":"Jakob Illeborg","family":"Pagter","sequence":"additional","affiliation":[{"name":"Partisia ApS, Aabogade 15, Aarhus N, Denmark"},{"name":"Sepior ApS, Inge Lehmanns Gade 10, Aarhus C, Denmark"}]},{"given":"Nigel P","family":"Smart","sequence":"additional","affiliation":[{"name":"imec-COSIC, KU Leuven, Kasteelpark Arenberg 10, bus 2452, Leuven-Heverlee, Belgium"},{"name":"Department of Computer Science, University of Bristol, Woodland Road, UK"},{"name":"Unbound Tech, 25 Efal Beit Amot Platinum, Petach Tikva, Israel"}]},{"given":"Rebecca N","family":"Wright","sequence":"additional","affiliation":[{"name":"DIMACS, Rutgers University, CoRE Building, 96 Frelinghuysen Road, Piscataway, NJ, USA"}]}],"member":"286","published-online":{"date-parts":[[2018,9,12]]},"reference":[{"key":"key\n\t\t\t\t20180912080316_bxy090C1","author":"Yao","year":"1986"},{"key":"key\n\t\t\t\t20180912080316_bxy090C2","author":"Bogdanov","year":"2007"},{"key":"key\n\t\t\t\t20180912080316_bxy090C3","author":"Bogdanov","year":"2013"},{"key":"key\n\t\t\t\t20180912080316_bxy090C4","first-page":"192","volume-title":"Proc. 13th European Symposium on Research in Computer Security\u2014ESORICS\u201908, Lecture Notes in Computer Science","author":"Bogdanov","year":"2008"},{"key":"key\n\t\t\t\t20180912080316_bxy090C5","first-page":"325","volume-title":"Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23\u201326, 2009. Revised Selected Papers, Lecture Notes in Computer Science","author":"Bogetoft","year":"2009"},{"key":"key\n\t\t\t\t20180912080316_bxy090C6","author":"Varian","year":"1995"},{"key":"key\n\t\t\t\t20180912080316_bxy090C7","first-page":"359","volume-title":"Topics in Cryptology\u2014CT-RSA 2013\u2014The Cryptographers\u2019 Track at the RSA Conference 2013, San Francisco,CA, USA, February 25\u2013March 1, 2013. Proceedings, Lecture Notes in Computer Science","author":"Bond","year":"2013"},{"key":"key\n\t\t\t\t20180912080316_bxy090C8","author":"Coull","year":"2013"},{"key":"key\n\t\t\t\t20180912080316_bxy090C9","author":"Albrecht","year":"2016"},{"key":"key\n\t\t\t\t20180912080316_bxy090C10","author":"Roche","year":"2016"},{"key":"key\n\t\t\t\t20180912080316_bxy090C11","author":"Damg\u00e5rd","year":"2013"},{"key":"key\n\t\t\t\t20180912080316_bxy090C12","author":"Cash","year":"2015"},{"key":"key\n\t\t\t\t20180912080316_bxy090C13","author":"Dwork","year":"2006"},{"key":"key\n\t\t\t\t20180912080316_bxy090C14","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1561\/0400000042","article-title":"The algorithmic foundations of differential privacy","volume":"9","author":"Dwork","year":"2014","journal-title":"Foundations Trends Theor. Comput. Sci."},{"key":"key\n\t\t\t\t20180912080316_bxy090C15","author":"Dwork","year":"2006"},{"key":"key\n\t\t\t\t20180912080316_bxy090C16","author":"Grassi","year":"2016"},{"key":"key\n\t\t\t\t20180912080316_bxy090C17","author":"Mazloom","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C18","author":"Kellaris","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C19","first-page":"1","article-title":"Rmind: a tool for cryptographically secure statistical analysis","volume":"PP","author":"Bogdanov","year":"2016","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"key\n\t\t\t\t20180912080316_bxy090C20","author":"Bogdanov","year":"2014"},{"key":"key\n\t\t\t\t20180912080316_bxy090C21","author":"Randmets","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C22","author":"Jagom\u00e4gis","year":"2010"},{"key":"key\n\t\t\t\t20180912080316_bxy090C23","author":"Bogdanov","year":"2014"},{"key":"key\n\t\t\t\t20180912080316_bxy090C24","author":"Siim","year":"2016"},{"key":"key\n\t\t\t\t20180912080316_bxy090C25","author":"Pullonen","year":"2013"},{"key":"key\n\t\t\t\t20180912080316_bxy090C26","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1007\/s10207-012-0177-2","article-title":"High-performance secure multi-party computation for data mining applications","volume":"11","author":"Bogdanov","year":"2012","journal-title":"Int. J. Inf. Secur."},{"key":"key\n\t\t\t\t20180912080316_bxy090C27","author":"Turban","year":"2014"},{"key":"key\n\t\t\t\t20180912080316_bxy090C28","author":"Kamm","year":"2015"},{"key":"key\n\t\t\t\t20180912080316_bxy090C29","author":"Bogdanov","year":"2012"},{"key":"key\n\t\t\t\t20180912080316_bxy090C30","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1515\/popets-2016-0019","article-title":"Students and taxes: a privacy-preserving study using secure computation","volume":"2016","author":"Bogdanov","year":"2016","journal-title":"PoPETs"},{"key":"key\n\t\t\t\t20180912080316_bxy090C31","author":"Talviste","year":"2016"},{"key":"key\n\t\t\t\t20180912080316_bxy090C32","author":"Bogdanov","year":"2015"},{"key":"key\n\t\t\t\t20180912080316_bxy090C33","author":"Bogdanov","year":"2016"},{"key":"key\n\t\t\t\t20180912080316_bxy090C34","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10207-014-0271-8","article-title":"Secure floating-point arithmetic and private satellite collision analysis","volume":"14","author":"Kamm","year":"2015","journal-title":"Int. J. Inf. Secur."},{"key":"key\n\t\t\t\t20180912080316_bxy090C35","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1093\/bioinformatics\/btt066","article-title":"A new way to protect privacy in large-scale genome-wide association studies","volume":"29","author":"Kamm","year":"2013","journal-title":"Bioinformatics"},{"key":"key\n\t\t\t\t20180912080316_bxy090C36","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/978-3-662-54970-4_10","volume-title":"Financial Cryptography and Data Security","author":"Damg\u00e5rd","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C37","first-page":"522","volume-title":"Proc. Twenty-Sixth Annual ACM Symposium on Theory of Computing, 23-25 May 1994, Montr\u00e9al, Qu\u00e9bec, Canada","author":"Santis","year":"1994"},{"key":"key\n\t\t\t\t20180912080316_bxy090C38","first-page":"250","volume-title":"Advances in Cryptology\u2014ASIACRYPT 2009, 15th Int. Conf. Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6\u201310, 2009. Proceedings, Lecture Notes in Computer Science","author":"Pinkas","year":"2009"},{"key":"key\n\t\t\t\t20180912080316_bxy090C39","author":"Araki","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C40","first-page":"613","volume-title":"Advances in Cryptology\u2014CRYPTO 2017\u201437th Annual Int. Cryptology Conf., Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II, Lecture Notes in Computer Science","author":"Lindell","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C41","author":"Frederiksen","year":"2018"},{"key":"key\n\t\t\t\t20180912080316_bxy090C42","author":"Lindell","year":"2017"},{"key":"key\n\t\t\t\t20180912080316_bxy090C43","first-page":"591","volume-title":"Proc. 22nd ACM SIGSAC Conf. Computer and Communications Security, Denver, CO, USA, October 12-6, 2015","author":"Mohassel","year":"2015"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/advance-article-pdf\/doi\/10.1093\/comjnl\/bxy090\/25720184\/bxy090.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T17:19:35Z","timestamp":1661707175000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/advance-article\/doi\/10.1093\/comjnl\/bxy090\/5095655"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,12]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy090","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,12]]}}}