{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:09:10Z","timestamp":1738818550141,"version":"3.37.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072336"],"award-info":[{"award-number":["62072336"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100019336","name":"Key Research and Development Program of Tianjin","doi-asserted-by":"publisher","award":["23YFZCSN00240"],"award-info":[{"award-number":["23YFZCSN00240"]}],"id":[{"id":"10.13039\/501100019336","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1109\/icnp61940.2024.10858571","type":"proceedings-article","created":{"date-parts":[[2025,2,4]],"date-time":"2025-02-04T18:29:45Z","timestamp":1738693785000},"page":"1-11","source":"Crossref","is-referenced-by-count":0,"title":["Mompe: Multiparty Oblivious Multivariate Polynomial Evaluation"],"prefix":"10.1109","author":[{"given":"Duobin","family":"Lyu","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China,300384"}]},{"given":"Hongwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China,300384"}]},{"given":"Zening","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China,300384"}]},{"given":"Jinsong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Tianjin University of Technology,Tianjin,China,300384"}]}],"member":"263","reference":[{"key":"ref1","first-page":"1651","article-title":"{GAZELLE}: A low latency framework for secure neural network inference","volume-title":"27th USENIX security symposium (USENIX security 18)","author":"Juvekar","year":"2018"},{"key":"ref2","first-page":"35","article-title":"Aby3: A mixed protocol framework for machine learning","volume-title":"Proceedings of the 2018 ACM SIGSAC conference on computer and communications security","author":"Mohassel","year":"2018"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00045"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"ref5","first-page":"809","article-title":"Cheetah: Lean and fast secure {Two-Party} deep neural network inference","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Huang","year":"2022"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833697"},{"key":"ref7","first-page":"2723","article-title":"Cerebro: A platform for Multi-Party cryptographic collaborative learning","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Zheng"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"510","DOI":"10.1007\/978-3-030-90567-5_26","article-title":"Noninteractive, secure verifiable aggregation for decentralized, privacypreserving learning","volume-title":"Australasian Conference on Information Security and Privacy","author":"Brunetta","year":"2021"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy090"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"ref11","article-title":"Efficient oblivious polynomial evaluation with simulation-based security","author":"Hazay","year":"2009","journal-title":"Cryptology ePrint Archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017-9263-y"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41702-4_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.01.008"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78372-3_5"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-56235-8_4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2012-0007"},{"key":"ref19","first-page":"187","article-title":"How to exchange secrets with oblivious transfer","volume":"2005","author":"Rabin","year":"2005","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_11"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0102-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45664-3_11"},{"issue":"6","key":"ref23","article-title":"Efficient oblivious transfer protocol based on bilinear pairing","volume":"39","author":"Xu","year":"2013","journal-title":"Jisuanji Gongcheng\/Computer Engineering"},{"issue":"12","key":"ref24","first-page":"186","article-title":"Oblivious transfer based on elliptic curve public key cryptosystems","volume":"40","author":"Xu","year":"2013","journal-title":"Computer Science"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2017.12.019"},{"journal-title":"List decoding for noisy channels","year":"1957","author":"Elias","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_18"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/129712.129780"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921876"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/335305.335337"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539704383633"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_22"},{"key":"ref34","first-page":"78","article-title":"Efficient information theoretic multiparty computation from oblivious linear evaluation","volume-title":"IFIP International Conference on Information Security Theory and Practice","author":"Cianciullo","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35199-1_8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511546891"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_6"},{"journal-title":"GitHub - data61\/MP-SPDZ: Versatile framework for multi-party computation","year":"2024","key":"ref40"}],"event":{"name":"2024 IEEE 32nd International Conference on Network Protocols (ICNP)","start":{"date-parts":[[2024,10,28]]},"location":"Charleroi, Belgium","end":{"date-parts":[[2024,10,31]]}},"container-title":["2024 IEEE 32nd International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10858485\/10858498\/10858571.pdf?arnumber=10858571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T05:59:00Z","timestamp":1738735140000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10858571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icnp61940.2024.10858571","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]}}}