{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T13:42:36Z","timestamp":1775569356711,"version":"3.50.1"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2014,9,1]],"date-time":"2014-09-01T00:00:00Z","timestamp":1409529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1109\/tifs.2014.2331753","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T21:35:17Z","timestamp":1403213717000},"page":"1356-1366","source":"Crossref","is-referenced-by-count":10,"title":["Transferable Multiparty Computation With Applications to the Smart Grid"],"prefix":"10.1109","volume":"9","author":[{"given":"Michael R.","family":"Clark","sequence":"first","affiliation":[]},{"given":"Kenneth M.","family":"Hopkinson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","author":"cramer","year":"0","journal-title":"Secure Multiparty Computation and Secret Sharing - An Information Theoretic Approach"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277716"},{"key":"ref12","article-title":"Redistributing secret shares to new access structures and its applications","author":"desmedt","year":"1997"},{"key":"ref13","article-title":"Seminumerical algorithms","volume":"2","author":"knuth","year":"1997","journal-title":"The art of computer programming"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.21236\/ADA461227","article-title":"Verifiable secret redistribution for threshold sharing schemes","author":"wong","year":"2002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/358746.358762"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-31284-7_33","article-title":"Private computation of spatial and temporal power consumption with smart meters","author":"erkin","year":"2012","journal-title":"Proc Int Conf Appl Cryptography Network Security"},{"key":"ref17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22444-7_15","article-title":"Privacy-friendly energy-metering via homomorphic encryption","author":"garcia","year":"2011","journal-title":"Proc 6th Int Conf Security Trust Manage"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24178-9_11","article-title":"Differentially private billing with rebates","author":"danezis","year":"2011","journal-title":"Proc 13th Inform Hiding Conf"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-24178-9_9","article-title":"I have a DREAM!: Differentially private smart metering","author":"\u00e1cs","year":"2011","journal-title":"Proc 13th Inform Hiding Conf"},{"key":"ref4","article-title":"Cryptographic protocols: Theory and implementation","author":"geisler","year":"2010"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382280"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2228343"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1878431.1878446"},{"key":"ref9","author":"canetti","year":"2000","journal-title":"Universally Composable Security A New Paradigm for Cryptographic Protocols"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.40"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2288131"},{"key":"ref22","author":"damgard","year":"2011","journal-title":"Multiparty computation from somewhat homomorphic encryption"},{"key":"ref21","article-title":"Tradeoffs in adversary models of smart grid privacy protocols using homomorphic encryption and secure multiparty computation","author":"clark","year":"2013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_9"},{"key":"ref23","author":"smart","year":"2011","journal-title":"Fully Homomorphic SIMD Operations"},{"key":"ref26","author":"kamara","year":"2011","journal-title":"Outsourcing Multi-Party Computation"},{"key":"ref25","author":"bogetoft","year":"2008","journal-title":"Multiparty Computation Goes Live"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/6867417\/06839004.pdf?arnumber=6839004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:28:47Z","timestamp":1642004927000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6839004\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9]]},"references-count":27,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2014.2331753","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,9]]}}}