{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T16:40:27Z","timestamp":1765039227373},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/tifs.2013.2288131","type":"journal-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T19:01:28Z","timestamp":1384282888000},"page":"2046-2058","source":"Crossref","is-referenced-by-count":134,"title":["Efficiently Outsourcing Multiparty Computation Under Multiple Keys"],"prefix":"10.1109","volume":"8","author":[{"given":"Andreas","family":"Peter","sequence":"first","affiliation":[]},{"given":"Erik","family":"Tews","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Katzenbeisser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1162\/jocn.1991.3.1.71"},{"key":"ref38","year":"1992","journal-title":"The Database of Faces (Formerly ?the orl Database of Faces?)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511721656"},{"key":"ref31","first-page":"175","article-title":"Privacy-friendly aggregation for the smart-grid","author":"kursawe","year":"2011","journal-title":"Proc PETS"},{"key":"ref30","first-page":"37","article-title":"A simple public-key cryptosystem with a double trapdoor decryption mechanism and its applications","author":"bresson","year":"2003","journal-title":"Proc ASIACRYPT"},{"key":"ref37","first-page":"1","article-title":"From dust to dawn: Practically efficient two-party secure function evaluation protocols and their modular design","author":"kolesnikov","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref36","first-page":"350","article-title":"A length-flexible threshold cryptosystem with applications","author":"damg\ufffdrd","year":"2003","journal-title":"Proc ACISP"},{"key":"ref35","first-page":"126","article-title":"Practical verifiable encryption and decryption of discrete logarithms","author":"camenisch","year":"2003","journal-title":"Proc Crypto"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-011-9601-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214087"},{"key":"ref11","first-page":"325","article-title":"Secure multiparty computation goes live","author":"bogetoft","year":"2009","journal-title":"Proc 13th Int Conf FC"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230218"},{"key":"ref12","first-page":"378","article-title":"Constant-round multiparty computation using a black-box pseudorandom generator","author":"damg\ufffdrd","year":"2005","journal-title":"Proc Crypto"},{"key":"ref13","first-page":"554","article-title":"A minimal model for secure computation","author":"feige","year":"1994","journal-title":"Proc 26th Annu ACM Symp Theory Comput"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ISTCS.1997.595170"},{"key":"ref15","first-page":"1","article-title":"Outsourcing multi-party computation","author":"kamara","year":"2011","journal-title":"Proc IAC"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337028"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76900-2_18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_8"},{"key":"ref19","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2011.039631"},{"key":"ref4","first-page":"280","article-title":"Multiparty computation from threshold homomorphic encryption","author":"cramer","year":"2001","journal-title":"Proc Int Conf Theory Appl Cryptograph Tech Adv Cryptol"},{"key":"ref27","first-page":"226","article-title":"Privacy-friendly energy-metering via homomorphic encryption","author":"garcia","year":"2010","journal-title":"Proc STM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653687"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref29","first-page":"235","article-title":"Privacy-preserving face recognition","author":"erkin","year":"2009","journal-title":"Proc PET"},{"key":"ref5","first-page":"97","article-title":"Efficient two-party secure computation on committed inputs","author":"jarecki","year":"2007","journal-title":"Proc 26th Annu Int Conf Adv Cryptol"},{"key":"ref8","first-page":"250","article-title":"Secure two-party computation is practical","author":"pinkas","year":"2009","journal-title":"Proc ASIACRYPT"},{"key":"ref7","first-page":"52","article-title":"An efficient protocol for secure two-party computation in the presence of malicious adversaries","author":"lindell","year":"2007","journal-title":"Proc 14th Annu Int Conf Theory Appl Cryptogr Technol"},{"key":"ref2","author":"barbaro","year":"2006","journal-title":"A Face is Exposed for AOL Searcher no 4417749"},{"key":"ref9","first-page":"445","article-title":"Perfectly secure multiparty computation and the computational overhead of cryptography","author":"damg\ufffdrd","year":"2010","journal-title":"Proc EUROCRYPT"},{"key":"ref1","author":"worley","year":"2010","journal-title":"The Facebook Privacy Scandal"},{"key":"ref20","first-page":"505","article-title":"Fully homomorphic encryption from ring-LWE and security for key dependent messages","author":"brakerski","year":"2011","journal-title":"Advances in CryptologyCRYPTO '99 Proc"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228343"},{"key":"ref22","first-page":"1","article-title":"On the impossibility of cryptography alone for privacy-preserving cloud computing","author":"van dijk","year":"2010","journal-title":"Proc HotSec Cryptol ePrint Archive"},{"key":"ref21","first-page":"1219","article-title":"On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption","author":"lopez-alt","year":"2013","journal-title":"Proc 44th Symp Theory Comput"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2012.2190726"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.49"},{"key":"ref41","first-page":"561","article-title":"Private computation of spatial and temporal power consumption with smart meters","author":"erkin","year":"2012","journal-title":"Proc ACNS"},{"key":"ref26","first-page":"102","article-title":"Private database queries using somewhat homomorphic encryption","author":"boneh","year":"2013","journal-title":"Proc ACNS"},{"key":"ref44","first-page":"118","article-title":"I have a dream! (differentially private smart metering)","author":"\ufffdcs","year":"2011","journal-title":"Proc IH"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123148"},{"key":"ref43","first-page":"192","article-title":"Plug-in privacy for smart metering billing","author":"jawurek","year":"2011","journal-title":"Proc PETS"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6656843\/06651830.pdf?arnumber=6651830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:45:14Z","timestamp":1638218714000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6651830\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":47,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2288131","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12]]}}}