{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T04:17:06Z","timestamp":1769314626293,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006502","name":"Defense Sciences Office, DARPA","doi-asserted-by":"publisher","award":["W911NF-15-C-0236"],"award-info":[{"award-number":["W911NF-15-C-0236"]}],"id":[{"id":"10.13039\/100006502","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3133976","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"783-798","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Implementing BP-Obfuscation Using Graph-Induced Encoding"],"prefix":"10.1145","author":[{"given":"Shai","family":"Halevi","sequence":"first","affiliation":[{"name":"IBM Research, Yorktown Heights, NY, USA"}]},{"given":"Tzipora","family":"Halevi","sequence":"additional","affiliation":[{"name":"CUNY Brooklyn College, Brooklyn, NY, USA"}]},{"given":"Victor","family":"Shoup","sequence":"additional","affiliation":[{"name":"IBM Research &amp; New York University, New York, NY, USA"}]},{"given":"Noah","family":"Stephens-Davidowitz","sequence":"additional","affiliation":[{"name":"New York University, New York, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Private communications","author":"Albrecht M. R.","year":"2016","unstructured":"M. R. Albrecht. Private communications, 2016."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48800-3_31"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1515\/jmc-2015-0016"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22006-7_34"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","unstructured":"J. Coron T. Lepoint and M. Tibouchi. Practical multilinear maps over the integers. In R. Canetti and J. A. Garay editors CRYPTO 2013 volume 8042 of Lecture Notes in Computer Science pages 476--493. Springer 2013. 10.1007\/978-3-642-40041-4_26","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1137\/14095772X"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_20"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"C. Gentry S. Halevi and N. Smart. Homomorphic evaluation of the AES circuit. In \"Advances in Cryptology - CRYPTO 2012\" volume 7417 of Lecture Notes in Computer Science pages 850--867. Springer 2012. Full version at http:\/\/eprint. iacr.org\/2012\/099.","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"e_1_3_2_2_14_1","first-page":"20","volume-title":"STOC","author":"Kilian J.","year":"1988","unstructured":"J. Kilian. Founding cryptography on oblivious transfer. In J. Simon, editor, STOC, pages 20--31. ACM, 1988."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"A. Langlois D. Stehl\u00e9 and R. Steinfeld. Gghlite: More efficient multilinear maps from ideal lattices. In P. Q. Nguyen and E. Oswald editors EUROCRYPT volume 8441 of Lecture Notes in Computer Science pages 239--256. Springer 2014.","DOI":"10.1007\/978-3-642-55220-5_14"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978314"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24273-2_3"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_41"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_5"},{"key":"e_1_3_2_2_20_1","unstructured":"V. Shoup. NTL: A Library for doing Number Theory. http:\/\/shoup.net\/ntl\/ Version 9.11.0 2016."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/b105056"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","location":"Dallas Texas USA","acronym":"CCS '17","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133976","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3133976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:26Z","timestamp":1750212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3133976"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":18,"alternative-id":["10.1145\/3133956.3133976","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3133976","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}