{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:37:43Z","timestamp":1740116263372,"version":"3.37.3"},"reference-count":29,"publisher":"World Scientific Pub Co Pte Ltd","issue":"09","funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802300"],"award-info":[{"award-number":["2017YFB0802300"]}]},{"name":"Key Lab of Information Network Security of Ministry of Public Security","award":["C18603"],"award-info":[{"award-number":["C18603"]}]},{"name":"NSFC-Zhejiang Joint Fund for the Integration of Industrialization and Informatization","award":["U1509219"],"award-info":[{"award-number":["U1509219"]}]},{"DOI":"10.13039\/100007219","name":"Shanghai Natural Science Foundation","doi-asserted-by":"crossref","award":["17ZR1408400"],"award-info":[{"award-number":["17ZR1408400"]}],"id":[{"id":"10.13039\/100007219","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61601129"],"award-info":[{"award-number":["61601129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11701179"],"award-info":[{"award-number":["11701179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shanghai Science and Technology Commission Program","award":["18511105700"],"award-info":[{"award-number":["18511105700"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J CIRCUIT SYST COMP"],"published-print":{"date-parts":[[2020,7]]},"abstract":"<jats:p>Statistics such as [Formula: see text]th minimum value play a crucial role in our data-driven society, for example by informing decision-making. In this paper, we propose an efficient privacy-preserving protocol that allows a group of users who do not trust each other, for example in a peer-to-peer (P2P) network, to jointly calculate the [Formula: see text]th minimum value. Specifically, in our proposed protocol each user\u2019s data is converted to a binary bit string following a certain rule. Then, the bits at the same position are aggregated from the leftmost to the rightmost. As far as we know, this is the first published scheme to obtain [Formula: see text]th minimum value in a P2P network without affecting users\u2019 privacy. We also remark that the proposed protocol can be easily generalized to compute other statistics, such as maximum value, minimum value, and median value, while achieving high efficiency in a privacy-preserving P2P network. We then demonstrate that the proposed protocol achieves forward security and is resilient to a range of external and internal attacks.<\/jats:p>","DOI":"10.1142\/s0218126620501388","type":"journal-article","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T08:28:59Z","timestamp":1570436939000},"page":"2050138","source":"Crossref","is-referenced-by-count":1,"title":["An Efficient Privacy-Preserving Protocol for Computing kth Minimum Value in P2P Networks"],"prefix":"10.1142","volume":"29","author":[{"given":"Yue","family":"Huang","sequence":"first","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, P.\u00a0R.\u00a0China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3904-9245","authenticated-orcid":false,"given":"Peng","family":"Zeng","sequence":"additional","affiliation":[{"name":"Shanghai Key Laboratory of Trustworthy Computing, East China Normal University, Shanghai, P.\u00a0R.\u00a0China"},{"name":"Key Lab of Information Network Security of Ministry of Public Security (The Third Research Institute of Ministry of Public Security), Shanghai, P.\u00a0R.\u00a0China"}]},{"given":"Kim-Kwang Raymond","family":"Choo","sequence":"additional","affiliation":[{"name":"Deparment of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 79249, USA"}]}],"member":"219","published-online":{"date-parts":[[2019,11,15]]},"reference":[{"volume-title":"Elementary Statistics","year":"2007","author":"Johnson R.","key":"S0218126620501388BIB001"},{"key":"S0218126620501388BIB002","first-page":"401","volume":"1","author":"Kotsiantis S.","year":"2007","journal-title":"Int. Sch. Sci. Res. Innov."},{"year":"2019","author":"Gu H.","journal-title":"IEEE Trans. Reliab.","key":"S0218126620501388BIB003"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB004","DOI":"10.1161\/CIRCOUTCOMES.118.005122"},{"key":"S0218126620501388BIB005","doi-asserted-by":"crossref","first-page":"e005122","DOI":"10.1161\/CIRCOUTCOMES.118.005122","volume":"12","author":"Gai K.","year":"2019","journal-title":"Circ., Cardiovasc. Qual. Outcomes"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB006","DOI":"10.1109\/SFCS.1982.38"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB007","DOI":"10.1145\/508171.508174"},{"key":"S0218126620501388BIB008","first-page":"9","volume":"14","author":"Zhang Y.","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB009","DOI":"10.1007\/s11432-017-9205-0"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB010","DOI":"10.1145\/3145625"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB011","DOI":"10.1109\/ICNP.2012.6459985"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB012","DOI":"10.1109\/TDSC.2013.31"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB013","DOI":"10.1109\/INFCOM.2010.5462147"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB014","DOI":"10.1016\/0022-0000(84)90070-9"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB015","DOI":"10.1186\/s40064-016-3061-0"},{"key":"S0218126620501388BIB016","first-page":"40","volume-title":"Proc. Int. Conf. Theory and Applications of Cryptographic Techniques","author":"Aggarwal G.","year":"2004"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB017","DOI":"10.1007\/s12083-016-0490-z"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB018","DOI":"10.1109\/AMS.2010.120"},{"key":"S0218126620501388BIB019","first-page":"202","volume-title":"Proc. Int. Workshop Security Protocols","author":"Hao F.","year":"2006"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB020","DOI":"10.1109\/INFCOM.2007.237"},{"key":"S0218126620501388BIB021","first-page":"353","volume":"2","author":"Kantarcioglu M.","year":"2009","journal-title":"Int. J. Inf. Comput. Secur."},{"year":"2019","author":"Guo P.","journal-title":"J. Circuits Syst. Comput.","key":"S0218126620501388BIB022"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB023","DOI":"10.1109\/JSTSP.2015.2429117"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB024","DOI":"10.1142\/S0218126619501901"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB025","DOI":"10.1142\/S0218126619501986"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB026","DOI":"10.1109\/TIE.2017.2762621"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB027","DOI":"10.1109\/TCAD.2019.2921350"},{"year":"2019","author":"Xie G.","journal-title":"IEEE Trans. Ind. Electron.","key":"S0218126620501388BIB028"},{"doi-asserted-by":"publisher","key":"S0218126620501388BIB029","DOI":"10.1109\/TC.2019.2935042"}],"container-title":["Journal of Circuits, Systems and Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0218126620501388","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T03:35:25Z","timestamp":1664595325000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/abs\/10.1142\/S0218126620501388"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":29,"journal-issue":{"issue":"09","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["10.1142\/S0218126620501388"],"URL":"https:\/\/doi.org\/10.1142\/s0218126620501388","relation":{},"ISSN":["0218-1266","1793-6454"],"issn-type":[{"type":"print","value":"0218-1266"},{"type":"electronic","value":"1793-6454"}],"subject":[],"published":{"date-parts":[[2019,11,15]]}}}