{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:34:08Z","timestamp":1767339248411,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":60,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,3]],"date-time":"2014-11-03T00:00:00Z","timestamp":1414972800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1223495","CNS-1017782","CNS-1223477","CNS-1117106","CNS-1330491","CNS-1228856"],"award-info":[{"award-number":["CNS-1223495","CNS-1017782","CNS-1223477","CNS-1117106","CNS-1330491","CNS-1228856"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000016","name":"U.S. Department of Health and Human Services","doi-asserted-by":"publisher","award":["90TR0003-01"],"award-info":[{"award-number":["90TR0003-01"]}],"id":[{"id":"10.13039\/100000016","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,3]]},"DOI":"10.1145\/2660267.2660291","type":"proceedings-article","created":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T13:40:05Z","timestamp":1415713205000},"page":"1280-1291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Controlled Functional Encryption"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Naveed","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Shashank","family":"Agrawal","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"Manoj","family":"Prabhakaran","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]},{"given":"XiaoFeng","family":"Wang","sequence":"additional","affiliation":[{"name":"Indiana University Bloomington, Bloomington, IN, USA"}]},{"given":"Erman","family":"Ayday","sequence":"additional","affiliation":[{"name":"Ecole polytechnique f\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"\u00c9cole polytechnique f\u00e9d\u00e9rale de Lausanne, Lausanne, Switzerland"}]},{"given":"Carl","family":"Gunter","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cancer facts and statistics. http:\/\/www.cancer.org\/ research\/ cancerfactsstatistics\/ .  Cancer facts and statistics. http:\/\/www.cancer.org\/ research\/ cancerfactsstatistics\/ ."},{"key":"e_1_3_2_1_2_1","unstructured":"A combinational multiplier using the xilinx spartan ii fpga. http:\/\/ecen3233.okstate.edu\/PDF\/Labs\/Combinational%20Multiplier.pdf .  A combinational multiplier using the xilinx spartan ii fpga. http:\/\/ecen3233.okstate.edu\/PDF\/Labs\/Combinational%20Multiplier.pdf ."},{"key":"e_1_3_2_1_3_1","unstructured":"Fast facts on US hospitals. http:\/\/www.aha.org\/ research\/ rc\/ stat-studies\/ fast-facts.shtml.  Fast facts on US hospitals. http:\/\/www.aha.org\/ research\/ rc\/ stat-studies\/ fast-facts.shtml."},{"key":"e_1_3_2_1_4_1","unstructured":"Havasupai tribe and the lawsuit settlement aftermath. http:\/\/genetics.ncai.org\/ case-study\/havasupai-Tribe.cfm.  Havasupai tribe and the lawsuit settlement aftermath. http:\/\/genetics.ncai.org\/ case-study\/havasupai-Tribe.cfm."},{"key":"e_1_3_2_1_5_1","unstructured":"Indian tribe wins fight to limit research of its dna. http:\/\/www.nytimes.com\/2010\/04\/ 22\/ us\/22dna.html?pagewanted=all&_r=1&.  Indian tribe wins fight to limit research of its dna. http:\/\/www.nytimes.com\/2010\/04\/ 22\/ us\/22dna.html?pagewanted=all&_r=1&."},{"key":"e_1_3_2_1_6_1","unstructured":"List of genetic diseases with associated genes and snp's. http:\/\/www.eupedia.com\/genetics\/genetic_diseases.shtml.  List of genetic diseases with associated genes and snp's. http:\/\/www.eupedia.com\/genetics\/genetic_diseases.shtml."},{"key":"e_1_3_2_1_7_1","unstructured":"Tpm reset attack. http:\/\/www.cs.dartmouth.edu\/ pkilab\/sparks\/ .  Tpm reset attack. http:\/\/www.cs.dartmouth.edu\/ pkilab\/sparks\/ ."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_28"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-005-0070-3"},{"key":"e_1_3_2_1_10_1","volume-title":"NDSS","author":"Ayday E.","year":"2013","unstructured":"E. Ayday , J. L. Raisaro , and J.-P. Hubaux . Privacy-enhancing technologies for medical tests using genomic data . In NDSS , 2013 . E. Ayday, J. L. Raisaro, and J.-P. Hubaux. Privacy-enhancing technologies for medical tests using genomic data. In NDSS, 2013."},{"key":"e_1_3_2_1_11_1","volume-title":"HealthTech","author":"Ayday E.","year":"2013","unstructured":"E. Ayday , J. L. Raisaro , P. J. McLaren , J. Fellay , and J.-P. Hubaux . Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data . In HealthTech , 2013 . E. Ayday, J. L. Raisaro, P. J. McLaren, J. Fellay, and J.-P. Hubaux. Privacy-preserving computation of disease risk by using genomic, clinical, and environmental data. In HealthTech, 2013."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_3_2_1_14_1","first-page":"26","volume-title":"Relations among notions of security for public-key encryption schemes. InCRYPTO'98, number 1462","author":"Bellare M.","unstructured":"M. Bellare , A. Desai , D. Pointcheval , and P. Rogaway . Relations among notions of security for public-key encryption schemes. InCRYPTO'98, number 1462 , pages 26 -- 45 . M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryption schemes. InCRYPTO'98, number 1462, pages 26--45."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053428"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33167-1_29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1987260.1987281"},{"key":"e_1_3_2_1_20_1","volume-title":"Privacy-preserving matching of DNA profiles. IACR Cryptology ePrint Archive","author":"Bruekers F.","year":"2008","unstructured":"F. Bruekers , S. Katzenbeisser , K. Kursawe , and P. Tuyls . Privacy-preserving matching of DNA profiles. IACR Cryptology ePrint Archive , 2008 :203, 2008. F. Bruekers, S. Katzenbeisser, K. Kursawe, and P. Tuyls. Privacy-preserving matching of DNA profiles. IACR Cryptology ePrint Archive, 2008:203, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_22_1","volume-title":"SCN","author":"Carter H.","year":"2013","unstructured":"H. Carter , C. Amrutkar , I. Dacosta , and P. Traynor . For your phone only: custom protocols for efficient secure function evaluation on mobile devices . SCN , 2013 . H. Carter, C. Amrutkar, I. Dacosta, and P. Traynor. For your phone only: custom protocols for efficient secure function evaluation on mobile devices. SCN, 2013."},{"key":"e_1_3_2_1_23_1","first-page":"289","volume-title":"USENIX Security","author":"Carter H.","year":"2013","unstructured":"H. Carter , B. Mood , P. Traynor , and K. Butler . Secure outsourced garbled circuit evaluation for mobile devices . In USENIX Security , pages 289 -- 304 , 2013 . H. Carter, B. Mood, P. Traynor, and K. Butler. Secure outsourced garbled circuit evaluation for mobile devices. In USENIX Security, pages 289--304, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_7"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381980"},{"key":"e_1_3_2_1_26_1","volume-title":"Privacy-enhanced methods for comparing compressed DNA sequences. arXiv preprint arXiv:1107.3593","author":"Eppstein D.","year":"2011","unstructured":"D. Eppstein , M. T. Goodrich , and P. Baldi . Privacy-enhanced methods for comparing compressed DNA sequences. arXiv preprint arXiv:1107.3593 , 2011 . D. Eppstein, M. T. Goodrich, and P. Baldi. Privacy-enhanced methods for comparing compressed DNA sequences. arXiv preprint arXiv:1107.3593, 2011."},{"key":"e_1_3_2_1_27_1","first-page":"260","volume-title":"CRYPTO, number 2139","author":"Fujisaki E.","year":"2001","unstructured":"E. Fujisaki , T. Okamoto , D. Pointcheval , and J. Stern . RSA-OAEP is secure under the RSA assumption . In CRYPTO, number 2139 , pages 260 -- 274 . Jan. 2001 . E. Fujisaki, T. Okamoto, D. Pointcheval, and J. Stern. RSA-OAEP is secure under the RSA assumption. In CRYPTO, number 2139, pages 260--274. Jan. 2001."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2013.13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_27"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488678"},{"key":"e_1_3_2_1_31_1","volume-title":"CRYPTO","author":"Gorbunov S.","year":"2012","unstructured":"S. Gorbunov , V. Vaikuntanathan , and H. Wee . Functional encryption with bounded collusions from multiparty computation . In CRYPTO , 2012 . S. Gorbunov, V. Vaikuntanathan, and H. Wee. Functional encryption with bounded collusions from multiparty computation. In CRYPTO, 2012."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_11"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488608.2488677"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"e_1_3_2_1_35_1","volume-title":"NDSS","author":"Huang Y.","year":"2012","unstructured":"Y. Huang , D. Evans , and J. Katz . Private set intersection: Are garbled circuits better than custom protocols . In NDSS , 2012 . Y. Huang, D. Evans, and J. Katz. Private set intersection: Are garbled circuits better than custom protocols. In NDSS, 2012."},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Security","volume":"201","author":"Huang Y.","year":"2011","unstructured":"Y. Huang , D. Evans , J. Katz , and L. Malka . Faster secure two-party computation using garbled circuits . In USENIX Security , volume 201 , 2011 . Y. Huang, D. Evans, J. Katz, and L. Malka. Faster secure two-party computation using garbled circuits. In USENIX Security, volume 201, 2011."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.43"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_2"},{"key":"e_1_3_2_1_39_1","first-page":"222","article-title":"Randomization techniques for secure computation","volume":"10","author":"Ishai Y.","year":"2013","unstructured":"Y. Ishai . Randomization techniques for secure computation . Secure Multi-Party Computation , 10 : 222 -- 248 , 2013 . Y. Ishai. Randomization techniques for secure computation. Secure Multi-Party Computation, 10:222--248, 2013.","journal-title":"Secure Multi-Party Computation"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.34"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_11"},{"key":"e_1_3_2_1_42_1","volume-title":"Outsourcing multi-party computation. IACR Cryptology ePrint Archive","author":"Kamara S.","year":"2011","unstructured":"S. Kamara , P. Mohassel , and M. Raykova . Outsourcing multi-party computation. IACR Cryptology ePrint Archive , 2011 :272, 2011. S. Kamara, P. Mohassel, and M. Raykova. Outsourcing multi-party computation. IACR Cryptology ePrint Archive, 2011:272, 2011."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382280"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788414.1788423"},{"key":"e_1_3_2_1_45_1","volume-title":"USENIX Security","author":"Kreuter B.","year":"2013","unstructured":"B. Kreuter , B. Mood , A. Shelat , and K. Butler . Pcf: A portable circuit format for scalable two-party secure computation . USENIX Security , 2013 . B. Kreuter, B. Mood, A. Shelat, and K. Butler. Pcf: A portable circuit format for scalable two-party secure computation. USENIX Security, 2013."},{"key":"e_1_3_2_1_46_1","first-page":"14","volume-title":"USENIX Security","author":"Kreuter B.","year":"2012","unstructured":"B. Kreuter , A. Shelat , and C.-H. Shen . Billion-gate secure computation with malicious adversaries . In USENIX Security , pages 14 -- 14 , 2012 . B. Kreuter, A. Shelat, and C.-H. Shen. Billion-gate secure computation with malicious adversaries. In USENIX Security, pages 14--14, 2012."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_1"},{"key":"e_1_3_2_1_48_1","first-page":"287","volume-title":"USENIX Security","author":"Malkhi D.","year":"2004","unstructured":"D. Malkhi , N. Nisan , B. Pinkas , and Y. Sella . Fairplay-secure two-party computation system . In USENIX Security , pages 287 -- 302 , 2004 . D. Malkhi, N. Nisan, B. Pinkas, and Y. Sella. Fairplay-secure two-party computation system. In USENIX Security, pages 287--302, 2004."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btq559"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516751"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881427"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_31"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/1777777.1777819"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866359"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"e_1_3_2_1_58_1","volume-title":"NDSS","author":"Szajda D.","year":"2006","unstructured":"D. Szajda , M. Pohl , J. Owen , B. G. Lawson , and V. Richmond . Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm . In NDSS , 2006 . D. Szajda, M. Pohl, J. Owen, B. G. Lawson, and V. Richmond. Toward a practical data privacy scheme for a distributed implementation of the smith-waterman genome sequence comparison algorithm. In NDSS, 2006."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653703"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.40"}],"event":{"name":"CCS'14: 2014 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Scottsdale Arizona USA","acronym":"CCS'14"},"container-title":["Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660291","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2660267.2660291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:10Z","timestamp":1750229770000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2660267.2660291"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,3]]},"references-count":60,"alternative-id":["10.1145\/2660267.2660291","10.1145\/2660267"],"URL":"https:\/\/doi.org\/10.1145\/2660267.2660291","relation":{},"subject":[],"published":{"date-parts":[[2014,11,3]]},"assertion":[{"value":"2014-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}