{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:52:22Z","timestamp":1759092742301,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T00:00:00Z","timestamp":1444953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808769.2808774","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Fast, Privacy Preserving Linear Regression over Distributed Datasets based on Pre-Distributed Data"],"prefix":"10.1145","author":[{"given":"Martine de","family":"Cock","sequence":"first","affiliation":[{"name":"University of Washington, Tacoma, WA, USA"}]},{"given":"Rafael","family":"Dowsley","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Anderson C.A.","family":"Nascimento","sequence":"additional","affiliation":[{"name":"University of Washington, Tacoma, USA"}]},{"given":"Stacey C.","family":"Newman","sequence":"additional","affiliation":[{"name":"University of Washington, Tacoma, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"volume-title":"ISOC Network and Distributed System Security Symposium -- NDSS 2013","year":"2013","author":"Aliasgari M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Beaver\n    .\n      \n  \n   \n  Precomputing oblivious transfer. In D. Coppersmith editor Advances in Cryptology -- CRYPTO'95 volume \n  963\n   of \n  Lecture Notes in Computer Science pages \n  97\n  --\n  109 Santa Barbara CA USA Aug. 27--31 1995\n  . \n  Springer Berlin Germany.   D. Beaver. Precomputing oblivious transfer. In D. Coppersmith editor Advances in Cryptology -- CRYPTO'95 volume 963 of Lecture Notes in Computer Science pages 97--109 Santa Barbara CA USA Aug. 27--31 1995. Springer Berlin Germany.","DOI":"10.1007\/3-540-44750-4_8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258637"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/646717.701908"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310923"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R.\n       \n      Bendlin I.\n       \n      Damg\u00e5rd C.\n       \n      Orlandi and \n      \n      \n      S.\n       \n      Zakarias\n      \n  \n  . \n  Semi-homomorphic encryption and multiparty computation. In K. G. Paterson editor Advances in Cryptology -- EUROCRYPT\n   \n  2011 volume \n  6632\n   of \n  Lecture Notes in Computer Science pages \n  169\n  --\n  188 Tallinn Estonia May 15--19 2011. \n  Springer Berlin Germany.   R. Bendlin I. Damg\u00e5rd C. Orlandi and S. Zakarias. Semi-homomorphic encryption and multiparty computation. In K. G. Paterson editor Advances in Cryptology -- EUROCRYPT 2011 volume 6632 of Lecture Notes in Computer Science pages 169--188 Tallinn Estonia May 15--19 2011. Springer Berlin Germany.","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016501125022"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"I.\n       \n      Damg\u00e5rd M.\n       \n      Keller E.\n       \n      Larraia V.\n       \n      Pastro P.\n       \n      Scholl and \n      \n      \n      N. P.\n       \n      Smart\n      \n  \n  . \n  Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits. In J. Crampton S. Jajodia and K. Mayes editors ESORICS 2013:  18th European Symposium on Research in Computer Security volume \n  8134\n   of \n  Lecture Notes in Computer Science pages \n  1\n  --\n  18 Egham UK Sept. 9--13 2013\n  . \n  Springer Berlin Germany.  I. Damg\u00e5rd M. Keller E. Larraia V. Pastro P. Scholl and N. P. Smart. Practical covertly secure MPC for dishonest majority - or: Breaking the SPDZ limits. In J. Crampton S. Jajodia and K. Mayes editors ESORICS 2013: 18th European Symposium on Research in Computer Security volume 8134 of Lecture Notes in Computer Science pages 1--18 Egham UK Sept. 9--13 2013. Springer Berlin Germany.","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"I.\n       \n      Damg\u00e5rd V.\n       \n      Pastro N. P.\n       \n      Smart and \n      \n      \n      S.\n       \n      Zakarias\n      \n  \n  . \n  Multiparty computation from somewhat homomorphic encryption. In R. Safavi-Naini and R. Canetti editors Advances in Cryptology -- CRYPTO\n   \n  2012 volume \n  7417\n   of \n  Lecture Notes in Computer Science pages \n  643\n  --\n  662 Santa Barbara CA USA Aug. 19--23 2012. \n  Springer Berlin Germany.  I. Damg\u00e5rd V. Pastro N. P. Smart and S. Zakarias. Multiparty computation from somewhat homomorphic encryption. In R. Safavi-Naini and R. Canetti editors Advances in Cryptology -- CRYPTO 2012 volume 7417 of Lecture Notes in Computer Science pages 643--662 Santa Barbara CA USA Aug. 19--23 2012. Springer Berlin Germany.","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"R.\n       \n      Dowsley J.\n       \n      Graaf D.\n       \n      Marques and \n      \n      \n      A. C. A.\n       \n      Nascimento\n    .\n      \n  \n   \n  A two-party protocol with trusted initializer for computing the inner product. In Y. Chung and M. Yung editors WISA 10:  11th International Workshop on Information Security Applications volume \n  6513\n   of \n  Lecture Notes in Computer Science pages \n  337\n  --\n  350 Jeju Island Korea Aug\n  . 24--26 2010\n  . \n  Springer Berlin Germany.   R. Dowsley J. Graaf D. Marques and A. C. A. Nascimento. A two-party protocol with trusted initializer for computing the inner product. In Y. Chung and M. Yung editors WISA 10: 11th International Workshop on Information Security Applications volume 6513 of Lecture Notes in Computer Science pages 337--350 Jeju Island Korea Aug. 24--26 2010. Springer Berlin Germany.","DOI":"10.1007\/978-3-642-17955-6_25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"R. Dowsley J. M\u00fcller-Quade A. Otsuka G. Hanaoka H. Imai and A. C. A. Nascimento. Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data. IEICE Transactions 94-A(2):725--734 2011.  R. Dowsley J. M\u00fcller-Quade A. Otsuka G. Hanaoka H. Imai and A. C. A. Nascimento. Universally composable and statistically secure verifiable secret sharing scheme based on pre-distributed data. IEICE Transactions 94-A(2):725--734 2011.","DOI":"10.1587\/transfun.E94.A.725"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972740.21"},{"key":"e_1_3_2_1_15_1","first-page":"927","volume-title":"28th International Colloquium, ICALP 2001, Crete, Greece, July 8--12, 2001","author":"Feigenbaum J.","year":"2001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159892.1159900"},{"volume-title":"Cambridge University Press","year":"2004","author":"Goldreich O.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/050643374"},{"issue":"4","key":"e_1_3_2_1_19_1","first-page":"669","article-title":"Secure multiple linear regression based on homomorphic encryption","volume":"27","author":"Hall R.","year":"2011","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_34"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1198\/106186005X47714"},{"issue":"1","key":"e_1_3_2_1_22_1","first-page":"125","article-title":"Privacy-preserving analysis of vertically partitioned data using secure matrix products","volume":"25","author":"Karr A. F.","year":"2009","journal-title":"Journal of Official Statistics"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_16"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"A. C. A.\n       \n      Nascimento J.\n       \n      M\u00fcller-Quade A.\n       \n      Otsuka G.\n       \n      Hanaoka and \n      \n      \n      H.\n       \n      Imai\n      \n  \n  . \n  Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations. In C. Boyd and W. Mao editors ISC 2003:  6th International Conference on Information Security volume \n  2851\n   of \n  Lecture Notes in Computer Science pages \n  151\n  --\n  164 Bristol UK Oct. 1--3 2003\n  . \n  Springer Berlin Germany.  A. C. A. Nascimento J. M\u00fcller-Quade A. Otsuka G. Hanaoka and H. Imai. Unconditionally secure homomorphic pre-distributed bit commitment and secure two-party computations. In C. Boyd and W. Mao editors ISC 2003: 6th International Conference on Information Security volume 2851 of Lecture Notes in Computer Science pages 151--164 Bristol UK Oct. 1--3 2003. Springer Berlin Germany.","DOI":"10.1007\/10958513_12"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"A. C. A.\n       \n      Nascimento J.\n       \n      M\u00fcller-Quade A.\n       \n      Otsuka G.\n       \n      Hanaoka and \n      \n      \n      H.\n       \n      Imai\n      \n  \n  . \n  Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. In M. Jakobsson M. Yung and J. Zhou editors ACNS 04:  2nd International Conference on Applied Cryptography and Network Security volume \n  3089\n   of \n  Lecture Notes in Computer Science pages \n  355\n  --\n  368 Yellow Mountain China June 8--11 2004\n  . \n  Springer Berlin Germany.  A. C. A. Nascimento J. M\u00fcller-Quade A. Otsuka G. Hanaoka and H. Imai. Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model. In M. Jakobsson M. Yung and J. Zhou editors ACNS 04: 2nd International Conference on Applied Cryptography and Network Security volume 3089 of Lecture Notes in Computer Science pages 355--368 Yellow Mountain China June 8--11 2004. Springer Berlin Germany.","DOI":"10.1007\/978-3-540-24852-1_26"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"P.\n       \n      Paillier\n    .\n      \n  \n   \n  Public-key cryptosystems based on composite degree residuosity classes. In J. Stern editor Advances in Cryptology -- EUROCRYPT'99 volume \n  1592\n   of \n  Lecture Notes in Computer Science pages \n  223\n  --\n  238 Prague Czech Republic May 2--6 1999\n  . \n  Springer Berlin Germany.   P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern editor Advances in Cryptology -- EUROCRYPT'99 volume 1592 of Lecture Notes in Computer Science pages 223--238 Prague Czech Republic May 2--6 1999. Springer Berlin Germany.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_28_1","unstructured":"R. L. Rivest. Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer. Preprint available at http:\/\/people.csail.mit.edu\/rivest\/Rivest- commitment.pdf 1999.  R. L. Rivest. Unconditionally secure commitment and oblivious transfer schemes using private channels and a trusted initializer. Preprint available at http:\/\/people.csail.mit.edu\/rivest\/Rivest- commitment.pdf 1999."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014139"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2621980"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0247-8"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808769.2808774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808769.2808774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:43Z","timestamp":1750223263000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808769.2808774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":31,"alternative-id":["10.1145\/2808769.2808774","10.1145\/2808769"],"URL":"https:\/\/doi.org\/10.1145\/2808769.2808774","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}