{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:13:38Z","timestamp":1773414818844,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001381","name":"National Research Foundation Singapore","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001381","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Infocomm Media Development Authority under its Trust Tech Funding Initiative"},{"DOI":"10.13039\/501100001348","name":"Agency for Science, Technology and Research","doi-asserted-by":"crossref","award":["RIE2020"],"award-info":[{"award-number":["RIE2020"]}],"id":[{"id":"10.13039\/501100001348","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Advanced Manufacturing and Engineering (AME) Programmatic Program","award":["A19E3b0099"],"award-info":[{"award-number":["A19E3b0099"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2024.3402355","type":"journal-article","created":{"date-parts":[[2024,5,17]],"date-time":"2024-05-17T17:24:30Z","timestamp":1715966670000},"page":"6184-6196","source":"Crossref","is-referenced-by-count":15,"title":["Enabling Threshold Functionality for Private Set Intersection Protocols in Cloud Computing"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4806-7189","authenticated-orcid":false,"given":"Jingwei","family":"Hu","sequence":"first","affiliation":[{"name":"Digital Trust Centre, Nanyang Technological University, Nanyang Ave, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7380-3806","authenticated-orcid":false,"given":"Yongjun","family":"Zhao","sequence":"additional","affiliation":[{"name":"TikTok, Nanyang Avenue, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8629-9052","authenticated-orcid":false,"given":"Benjamin","family":"Hong Meng Tan","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Agency for Science, Technology and Research (A*STAR), Connexis South Tower, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5652-3455","authenticated-orcid":false,"given":"Khin Mi Mi","family":"Aung","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research, Agency for Science, Technology and Research (A*STAR), Connexis South Tower, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7669-8922","authenticated-orcid":false,"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Physical and Mathematical Sciences, Nanyang Technological University, Nanyang Ave, Singapore"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10022"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3338498.3358645"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65411-5_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268965"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.24"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-019-09319-x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref10","first-page":"1","article-title":"Private set intersection: Are garbled circuits better than custom protocols?","volume-title":"Proc. NDSS","author":"Huang"},{"key":"ref11","first-page":"515","article-title":"Phasing: Private set intersection using permutation-based hashing","volume-title":"Proc. 24th USENIX Conf. Secur. Symp.","author":"Pinkas"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0018"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92075-3_21"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582817"},{"key":"ref17","volume-title":"Enabling Two-Party Secure Computation on Set Intersection","author":"Karako\u00e7","year":"2023"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/11957454_16"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23318-5_12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_24"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78372-7_5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26951-7_1"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3118879"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3101059"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92078-4_23"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2023.i1.501-537"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.46586\/tches.v2024.i1.592-616"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22966-4_5"},{"key":"ref32","first-page":"149","article-title":"Putting up the Swiss army knife of homomorphic calculations by means of TFHE functional bootstrapping","volume":"2022","author":"Clet","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12612-4_6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_17"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10534079.pdf?arnumber=10534079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,25]],"date-time":"2024-06-25T19:35:05Z","timestamp":1719344105000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10534079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/tifs.2024.3402355","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}