{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T01:22:38Z","timestamp":1776993758401,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,12]],"date-time":"2015-10-12T00:00:00Z","timestamp":1444608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["1149647"],"award-info":[{"award-number":["1149647"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,12]]},"DOI":"10.1145\/2810103.2813705","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T15:22:12Z","timestamp":1444144932000},"page":"591-602","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":81,"title":["Fast and Secure Three-party Computation"],"prefix":"10.1145","author":[{"given":"Payman","family":"Mohassel","sequence":"first","affiliation":[{"name":"Yahoo Labs, sunnyvale, CA, USA"}]},{"given":"Mike","family":"Rosulek","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Ye","family":"Zhang","sequence":"additional","affiliation":[{"name":"Google Inc., Mountain View, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,10,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_22"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_31"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455804"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.39"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_10"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382279"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_5"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/874063.875553"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_29"},{"key":"e_1_3_2_1_15_1","volume-title":"Implementation and evaluation of an efficient secure computation system using 'R' for healthcare statistics. Journal of the American Medical Informatics Association, 21(e2):e326--e331","author":"Chida Koji","year":"2014"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_23"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32928-9_14"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195408"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_21"},{"key":"e_1_3_2_1_21_1","volume-title":"Viff: Virtual ideal functionality framework. Homepage: http:\/\/viff. dk","author":"Geisler Martin","year":"2007"},{"key":"e_1_3_2_1_22_1","series-title":"LNCS","volume-title":"Garay and Rosario Gennaro","author":"Juan","year":"2014"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0319-z"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44381-1_26"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Yuval\n      Ishai Ranjit\n      Kumaresan Eyal\n      Kushilevitz and \n      Anat\n      Paskin-Cherniavsky\n    .\n  Secure computation with minimal interaction revisited\n  . In Rosario Gennaro and Matthew Robshaw editors CRYPTO \n  2015 volume \n  9216\n   of \n  LNCS pages \n  359\n  --\n  378\n  . \n  Springer 2015.  Yuval Ishai Ranjit Kumaresan Eyal Kushilevitz and Anat Paskin-Cherniavsky. Secure computation with minimal interaction revisited. In Rosario Gennaro and Matthew Robshaw editors CRYPTO 2015 volume 9216 of LNCS pages 359--378. Springer 2015.","DOI":"10.1007\/978-3-662-48000-7_18"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Yuval\n      Ishai Eyal\n      Kushilevitz and \n      Anat\n      Paskin\n    .\n  Secure multiparty computation with minimal interaction\n  . In Tal Rabin editor CRYPTO \n  2010 volume \n  6223\n   of \n  LNCS pages \n  577\n  --\n  594\n  . \n  Springer August 2010.   Yuval Ishai Eyal Kushilevitz and Anat Paskin. Secure multiparty computation with minimal interaction. In Tal Rabin editor CRYPTO 2010 volume 6223 of LNCS pages 577--594. Springer August 2010.","DOI":"10.1007\/978-3-642-14623-7_31"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_30_1","volume-title":"In USENIX Security. Citeseer","author":"Kreuter Benjamin","year":"2012"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54833-8_2"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398856.2364556"},{"key":"e_1_3_2_1_33_1","first-page":"495","volume-title":"Garay and GennarociteC14--2","author":"Larraia Enrique"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9036-8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85855-3_2"},{"key":"e_1_3_2_1_36_1","first-page":"476","volume-title":"Garay and GennarociteC14--2","author":"Lindell Yehuda"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_6"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196774"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_40"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73014"},{"key":"e_1_3_2_1_41_1","unstructured":"20th ACM STOC. ACM Press May 1988.  20th ACM STOC. ACM Press May 1988."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Samee\n      Zahur Mike\n      Rosulek and \n      David\n      Evans\n    .\n  Two halves make a whole - reducing data transfer in garbled circuits using half gates\n  . In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT \n  2015 Part II volume \n  9057\n   of \n  LNCS pages \n  220\n  --\n  250\n  . \n  Springer April 2015.  Samee Zahur Mike Rosulek and David Evans. Two halves make a whole - reducing data transfer in garbled circuits using half gates. In Elisabeth Oswald and Marc Fischlin editors EUROCRYPT 2015 Part II volume 9057 of LNCS pages 220--250. Springer April 2015.","DOI":"10.1007\/978-3-662-46803-6_8"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","location":"Denver Colorado USA","acronym":"CCS'15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2810103.2813705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:24Z","timestamp":1750225704000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2810103.2813705"}},"subtitle":["The Garbled Circuit Approach"],"short-title":[],"issued":{"date-parts":[[2015,10,12]]},"references-count":44,"alternative-id":["10.1145\/2810103.2813705","10.1145\/2810103"],"URL":"https:\/\/doi.org\/10.1145\/2810103.2813705","relation":{},"subject":[],"published":{"date-parts":[[2015,10,12]]},"assertion":[{"value":"2015-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}