{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T05:38:07Z","timestamp":1757569087663,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T00:00:00Z","timestamp":1527552000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JST CREST","award":["JPMJCR1688"],"award-info":[{"award-number":["JPMJCR1688"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,29]]},"DOI":"10.1145\/3196494.3196552","type":"proceedings-article","created":{"date-parts":[[2018,5,31]],"date-time":"2018-05-31T13:18:28Z","timestamp":1527772708000},"page":"685-697","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly"],"prefix":"10.1145","author":[{"given":"Nuttapong","family":"Attrapadung","sequence":"first","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Goichiro","family":"Hanaoka","sequence":"additional","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Shigeo","family":"Mitsunari","sequence":"additional","affiliation":[{"name":"Cybozu Labs, Inc., Tokyo, Japan"}]},{"given":"Yusuke","family":"Sakai","sequence":"additional","affiliation":[{"name":"AIST, Tokyo, Japan"}]},{"given":"Kana","family":"Shimizu","sequence":"additional","affiliation":[{"name":"Waseda University, Tokyo, Japan"}]},{"given":"Tadanori","family":"Teruya","sequence":"additional","affiliation":[{"name":"AIST, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,5,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43414-7_1"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Fast Software Implementations of Bilinear Pairings","volume":"99","author":"Azarderakhsh R.","year":"2017","unstructured":"R. Azarderakhsh , D. Fishbein , G. Grewal , S. Hu , D. Jao , P. Longa , and R. Verma . 2017 . Fast Software Implementations of Bilinear Pairings . IEEE Transactions on Dependable and Secure Computing PP , 99 (2017), 1 -- 1 . R. Azarderakhsh, D. Fishbein, G. Grewal, S. Hu, D. Jao, P. Longa, and R. Verma. 2017. Fast Software Implementations of Bilinear Pairings. IEEE Transactions on Dependable and Secure Computing PP, 99 (2017), 1--1.","journal-title":"IEEE Transactions on Dependable and Secure Computing PP"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_22"},{"key":"e_1_3_2_1_6_1","volume-title":"13th International Conference on Cryptology in India, Kolkata, India, December 9--12, 2012. Proceedings (Lecture Notes in Computer Science), Steven D. Galbraith and Mridul Nandi (Eds.)","volume":"7668","author":"Daniel","unstructured":"Daniel J. Bernstein and Tanja Lange. 2012. Computing Small Discrete Logarithms Faster. In Progress in Cryptology - INDOCRYPT 2012 , 13th International Conference on Cryptology in India, Kolkata, India, December 9--12, 2012. Proceedings (Lecture Notes in Computer Science), Steven D. Galbraith and Mridul Nandi (Eds.) , Vol. 7668 . Springer, 317--338. Daniel J. Bernstein and Tanja Lange. 2012. Computing Small Discrete Logarithms Faster. In Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9--12, 2012. Proceedings (Lecture Notes in Computer Science), Steven D. Galbraith and Mridul Nandi (Eds.), Vol. 7668. Springer, 317--338."},{"key":"e_1_3_2_1_7_1","volume-title":"Shigeo Mitsunari, Eiji Okamoto, Francisco Rodr\u00edguez-Henr\u00edquez, and Tadanori Teruya.","author":"Beuchat Jean-Luc","year":"2010","unstructured":"Jean-Luc Beuchat , Jorge Enrique Gonz\u00e1lez-D\u00edaz , Shigeo Mitsunari, Eiji Okamoto, Francisco Rodr\u00edguez-Henr\u00edquez, and Tadanori Teruya. 2010 . High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves. In Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings (Lecture Notes in Computer Science), Marc Joye, Atsuko Miyaji, and Akira Otsuka (Eds.), Vol. 6487 . Springer , 21--39. Jean-Luc Beuchat, Jorge Enrique Gonz\u00e1lez-D\u00edaz, Shigeo Mitsunari, Eiji Okamoto, Francisco Rodr\u00edguez-Henr\u00edquez, and Tadanori Teruya. 2010. High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves. In Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings (Lecture Notes in Computer Science), Marc Joye, Atsuko Miyaji, and Akira Otsuka (Eds.), Vol. 6487. Springer, 21--39."},{"key":"e_1_3_2_1_8_1","volume-title":"Advances in Cryptology - CRYPTO","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh , Xavier Boyen , and Hovav Shacham . 2004. Short Group Signatures . In Advances in Cryptology - CRYPTO 2004 , 24th Annual International CryptologyConference, Santa Barbara , California, USA, August 15--19, 2004, Proceedings (Lecture Notes in Computer Science), Matthew K. Franklin (Ed.), Vol. 3152 . Springer , 41--55. Dan Boneh, Xavier Boyen, and Hovav Shacham. 2004. Short Group Signatures. In Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15--19, 2004, Proceedings (Lecture Notes in Computer Science), Matthew K. Franklin (Ed.), Vol. 3152. Springer, 41--55."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813624"},{"key":"e_1_3_2_1_13_1","volume-title":"Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30","author":"Cheon Jung Hee","year":"2015","unstructured":"Jung Hee Cheon and Damien Stehl\u00e9 . 2015. Fully Homomophic Encryption over the Integers Revisited . In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30 , 2015 , Proceedings, Part I (Lecture Notes in Computer Science), Elisabeth Oswald and Marc Fischlin (Eds.), Vol. 9056 . Springer , 513--536. Jung Hee Cheon and Damien Stehl\u00e9. 2015. Fully Homomophic Encryption over the Integers Revisited. In Advances in Cryptology - EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26--30, 2015, Proceedings, Part I (Lecture Notes in Computer Science), Elisabeth Oswald and Marc Fischlin (Eds.), Vol. 9056. Springer, 513--536."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12--16","author":"Cramer Ronald","year":"1996","unstructured":"Ronald Cramer , Matthew K. Franklin , Berry Schoenmakers , and Moti Yung . 1996. Multi-Autority Secret-Ballot Elections with Linear Work . In Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12--16 , 1996 , Proceeding (Lecture Notes in Computer Science), Ueli M. Maurer (Ed.), Vol. 1070 . Springer , 72--83. Ronald Cramer, Matthew K. Franklin, Berry Schoenmakers, and Moti Yung. 1996. Multi-Autority Secret-Ballot Elections with Linear Work. In Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12--16, 1996, Proceeding (Lecture Notes in Computer Science), Ueli M. Maurer (Ed.), Vol. 1070. Springer, 72--83."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"e_1_3_2_1_17_1","volume-title":"Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques","author":"Cramer Ronald","year":"1997","unstructured":"Ronald Cramer , Rosario Gennaro , and Berry Schoenmakers . 1997. A Secure and Optimally Efficient Multi-Authority Election Scheme . In Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques , Konstanz, Germany , May 11--15, 1997 , Proceeding (Lecture Notes in Computer Science), Walter Fumy (Ed.), Vol. 1233 . Springer , 103--118. Ronald Cramer, Rosario Gennaro, and Berry Schoenmakers. 1997. A Secure and Optimally Efficient Multi-Authority Election Scheme. In Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11--15, 1997, Proceeding (Lecture Notes in Computer Science), Walter Fumy (Ed.), Vol. 1233. Springer, 103--118."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_20_1","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Freedman Michael J.","year":"2004","unstructured":"Michael J. Freedman , Kobbi Nissim , and Benny Pinkas . 2004. Efficient Private Matching and Set Intersection . In Advances in Cryptology - EUROCRYPT 2004 , International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2--6, 2004, Proceedings (Lecture Notes in Computer Science), Christian Cachin and Jan Camenisch (Eds.), Vol. 3027 . Springer , 1--19. Michael J. Freedman, Kobbi Nissim, and Benny Pinkas. 2004. Efficient Private Matching and Set Intersection. In Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2--6, 2004, Proceedings (Lecture Notes in Computer Science), Christian Cachin and Jan Camenisch (Eds.), Vol. 3027. Springer, 1--19."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"David Mandell Freeman. 2010. Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups See {29} 44--61.  David Mandell Freeman. 2010. Converting Pairing-Based Cryptosystems from Composite-Order Groups to Prime-Order Groups See {29} 44--61.","DOI":"10.1007\/978-3-642-13190-5_3"},{"key":"e_1_3_2_1_22_1","volume-title":"Second International Conference","author":"Steven","year":"2008","unstructured":"Steven D. Galbraith and Kenneth G. Paterson (Eds.). 2008. Pairing-Based Cryptography - Pairing 2008 , Second International Conference , Egham, UK, September 1--3 , 2008 . Proceedings. Lecture Notes in Computer Science, Vol. 5209. Springer. Steven D. Galbraith and Kenneth G. Paterson (Eds.). 2008. Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1--3, 2008. Proceedings. Lecture Notes in Computer Science, Vol. 5209. Springer."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"e_1_3_2_1_27_1","volume-title":"Asymptotically-Faster, Attribute-Based. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference","author":"Gentry Craig","year":"2013","unstructured":"Craig Gentry , Amit Sahai , and Brent Waters . 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler , Asymptotically-Faster, Attribute-Based. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference , Santa Barbara, CA, USA , August 18--22, 2013 . Proceedings, Part I (Lecture Notes in Computer Science), Ran Canetti and Juan A. Garay (Eds.), Vol. 8042 . Springer , 75--92. Craig Gentry, Amit Sahai, and Brent Waters. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18--22, 2013. Proceedings, Part I (Lecture Notes in Computer Science), Ran Canetti and Juan A. Garay (Eds.), Vol. 8042. Springer, 75--92."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2011.03.083"},{"key":"e_1_3_2_1_29_1","volume-title":"29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings. Lecture Notes in Computer Science","volume":"6110","author":"Ed Henri Gilbert","year":"2010","unstructured":"Henri Gilbert ( Ed .). 2010 . Advances in Cryptology - EUROCRYPT 2010 , 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings. Lecture Notes in Computer Science , Vol. 6110 . Springer. Henri Gilbert (Ed.). 2010. Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010. Proceedings. Lecture Notes in Computer Science, Vol. 6110. Springer."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1137\/080725386"},{"key":"e_1_3_2_1_31_1","unstructured":"W3C Community Group. 2017. WebAssembly. (2017). http:\/\/webassembly.org\/.  W3C Community Group. 2017. WebAssembly. (2017). http:\/\/webassembly.org\/."},{"key":"e_1_3_2_1_32_1","volume-title":"Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference","author":"Herold Gottfried","year":"2014","unstructured":"Gottfried Herold , Julia Hesse , Dennis Hofheinz , Carla R\u00e0fols , and Andy Rupp . 2014 . Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference , Santa Barbara, CA, USA , August 17--21, 2014, Proceedings, Part I (Lecture Notes in Computer Science), Juan A. Garay and Rosario Gennaro (Eds.), Vol. 8616 . Springer , 261--279. Gottfried Herold, Julia Hesse, Dennis Hofheinz, Carla R\u00e0fols, and Andy Rupp. 2014. Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations. In Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17--21, 2014, Proceedings, Part I (Lecture Notes in Computer Science), Juan A. Garay and Rosario Gennaro (Eds.), Vol. 8616. Springer, 261--279."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85538-5_2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881709"},{"key":"e_1_3_2_1_35_1","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Joye Marc","year":"2013","unstructured":"Marc Joye and Beno\u00eet Libert . 2013. Efficient Cryptosystems from 2 k -th Power Residue Symbols . In Advances in Cryptology - EUROCRYPT 2013 , 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26--30, 2013. Proceedings (Lecture Notes in Computer Science), Thomas Johansson and Phong Q. Nguyen (Eds.), Vol. 7881 . Springer , 76--92. Marc Joye and Beno\u00eet Libert. 2013. Efficient Cryptosystems from 2 k -th Power Residue Symbols. In Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26--30, 2013. Proceedings (Lecture Notes in Computer Science), Thomas Johansson and Phong Q. Nguyen (Eds.), Vol. 7881. Springer, 76--92."},{"key":"e_1_3_2_1_36_1","first-page":"272","article-title":"Outsourcing Multi-Party Computation","volume":"2011","author":"Kamara Seny","year":"2011","unstructured":"Seny Kamara , Payman Mohassel , and Mariana Raykova . 2011 . Outsourcing Multi-Party Computation . IACR Cryptology ePrint Archive 2011 (2011), 272 . http:\/\/eprint.iacr.org\/2011\/272 Seny Kamara, Payman Mohassel, and Mariana Raykova. 2011. Outsourcing Multi-Party Computation. IACR Cryptology ePrint Archive 2011 (2011), 272. http:\/\/eprint.iacr.org\/2011\/272","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_37_1","volume-title":"Scalar Multiplication on Pairing Friendly Elliptic Curves. IEICE Transactions 94-A, 6","author":"Kanayama Naoki","year":"2011","unstructured":"Naoki Kanayama , Tadanori Teruya , and Eiji Okamoto . 2011. Scalar Multiplication on Pairing Friendly Elliptic Curves. IEICE Transactions 94-A, 6 ( 2011 ), 1285--1292. Naoki Kanayama, Tadanori Teruya, and Eiji Okamoto. 2011. Scalar Multiplication on Pairing Friendly Elliptic Curves. IEICE Transactions 94-A, 6 (2011), 1285--1292."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_20"},{"key":"e_1_3_2_1_39_1","volume-title":"PublicKey Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography","author":"Kim Taechan","year":"2017","unstructured":"Taechan Kim and Jinhyuck Jeong . 2017. Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree . In PublicKey Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography , Amsterdam, The Netherlands, March 28--31, 2017 , Proceedings, Part I (Lecture Notes in Computer Science), Serge Fehr (Ed.), Vol. 10174 . Springer , 388--408. Taechan Kim and Jinhyuck Jeong. 2017. Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. In PublicKey Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28--31, 2017, Proceedings, Part I (Lecture Notes in Computer Science), Serge Fehr (Ed.), Vol. 10174. Springer, 388--408."},{"key":"e_1_3_2_1_40_1","volume-title":"Computationally-Private Information Retrieval. In 38th Annual Symposium on Foundations of Computer Science, FOCS '97","author":"Kushilevitz Eyal","year":"1997","unstructured":"Eyal Kushilevitz and Rafail Ostrovsky . 1997 . Replication is NOT Needed: SINGLE Database , Computationally-Private Information Retrieval. In 38th Annual Symposium on Foundations of Computer Science, FOCS '97 , Miami Beach, Florida, USA, October 19--22 , 1997. IEEE Computer Society, 364--373. Eyal Kushilevitz and Rafail Ostrovsky. 1997. Replication is NOT Needed: SINGLE Database, Computationally-Private Information Retrieval. In 38th Annual Symposium on Foundations of Computer Science, FOCS '97, Miami Beach, Florida, USA, October 19--22, 1997. IEEE Computer Society, 364--373."},{"key":"e_1_3_2_1_41_1","volume-title":"Optimised Versions of the Ate and Twisted Ate Pairings. IEICE Transactions 92-A, 7","author":"Matsuda Seiichi","year":"2009","unstructured":"Seiichi Matsuda , Naoki Kanayama , Florian Hess , and Eiji Okamoto . 2009. Optimised Versions of the Ate and Twisted Ate Pairings. IEICE Transactions 92-A, 7 ( 2009 ), 1660--1667. Seiichi Matsuda, Naoki Kanayama, Florian Hess, and Eiji Okamoto. 2009. Optimised Versions of the Ate and Twisted Ate Pairings. IEICE Transactions 92-A, 7 (2009), 1660--1667."},{"key":"e_1_3_2_1_42_1","volume-title":"Paradigms in Cryptology - Mycrypt","author":"Menezes Alfred","year":"2016","unstructured":"Alfred Menezes , Palash Sarkar , and Shashank Singh . 2016. Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography . In Paradigms in Cryptology - Mycrypt 2016 . Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1--2, 2016, Revised Selected Papers (Lecture Notes in Computer Science), Raphael C.-W. Phan and Moti Yung (Eds.), Vol. 10311 . Springer , 83--108. Alfred Menezes, Palash Sarkar, and Shashank Singh. 2016. Challenges with Assessing the Impact of NFS Advances on the Security of Pairing-Based Cryptography. In Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1--2, 2016, Revised Selected Papers (Lecture Notes in Computer Science), Raphael C.-W. Phan and Moti Yung (Eds.), Vol. 10311. Springer, 83--108."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0315-8"},{"key":"e_1_3_2_1_44_1","unstructured":"Shigeo Mitsunari. 2017. mcl: A generic and fast pairing-based cryptography library. (2017). https:\/\/github.com\/herumi\/mcl  Shigeo Mitsunari. 2017. mcl: A generic and fast pairing-based cryptography library. (2017). https:\/\/github.com\/herumi\/mcl"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Nadia El Mrabet and Marc Joye (Eds.). 2016. Guide to Pairing-Based Cryptography. Chapman and Hall\/CRC.   Nadia El Mrabet and Marc Joye (Eds.). 2016. Guide to Pairing-Based Cryptography. Chapman and Hall\/CRC.","DOI":"10.1201\/9781315370170"},{"key":"e_1_3_2_1_46_1","volume-title":"Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 -","author":"Okamoto Tatsuaki","year":"1998","unstructured":"Tatsuaki Okamoto and Shigenori Uchiyama . 1998. A New Public-Key Cryptosystem as Secure as Factoring . In Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998 , Proceeding (Lecture Notes in Computer Science), Kaisa Nyberg (Ed.), Vol. 1403 . Springer , 308--318. Tatsuaki Okamoto and Shigenori Uchiyama. 1998. A New Public-Key Cryptosystem as Secure as Factoring. In Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding (Lecture Notes in Computer Science), Kaisa Nyberg (Ed.), Vol. 1403. Springer, 308--318."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-0565-3"},{"key":"e_1_3_2_1_48_1","volume-title":"Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6","author":"Paillier Pascal","year":"1999","unstructured":"Pascal Paillier . 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes . In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6 , 1999 , Proceeding (Lecture Notes in Computer Science), Jacques Stern (Ed.), Vol. 1592 . Springer , 223--238. Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2--6, 1999, Proceeding (Lecture Notes in Computer Science), Jacques Stern (Ed.), Vol. 1592. Springer, 223--238."},{"key":"e_1_3_2_1_49_1","first-page":"918","article-title":"Monte Carlo methods for index computation (mod p)","volume":"32","author":"Pollard John M.","year":"1978","unstructured":"John M. Pollard . 1978 . Monte Carlo methods for index computation (mod p) . Math. Comp. 32 , 143 (1978), 918 -- 924 . John M. Pollard. 1978. Monte Carlo methods for index computation (mod p). Math. Comp. 32, 143 (1978), 918--924.","journal-title":"Math. Comp."},{"key":"e_1_3_2_1_50_1","unstructured":"R. Rivest L. Adleman and M. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation. (1978). https:\/\/people.csail.mit.edu\/rivest\/RivestAdlemanDertouzosOnDataBanksAndPrivacyHomomorphisms.pdf.  R. Rivest L. Adleman and M. Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of Secure Computation. (1978). https:\/\/people.csail.mit.edu\/rivest\/RivestAdlemanDertouzosOnDataBanksAndPrivacyHomomorphisms.pdf."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_52_1","volume-title":"Methods for Restricting Message Space in Public-Key Encryption. IEICE Transactions 96-A, 6","author":"Sakai Yusuke","year":"2013","unstructured":"Yusuke Sakai , Keita Emura , Goichiro Hanaoka , Yutaka Kawai , and Kazumasa Omote . 2013. Methods for Restricting Message Space in Public-Key Encryption. IEICE Transactions 96-A, 6 ( 2013 ), 1156--1168. Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, and Kazumasa Omote. 2013. Methods for Restricting Message Space in Public-Key Encryption. IEICE Transactions 96-A, 6 (2013), 1156--1168."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_2"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_6"},{"key":"e_1_3_2_1_55_1","first-page":"S6","article-title":"Privacy-preserving search for chemical compound databases. BMC bioinformatics 16","volume":"18","author":"Shimizu Kana","year":"2015","unstructured":"Kana Shimizu , Koji Nuida , Hiromi Arai , Shigeo Mitsunari , Nuttapong Attrapadung , Michiaki Hamada , Koji Tsuda , Takatsugu Hirokawa , Jun Sakuma , Goichiro Hanaoka , 2015 . Privacy-preserving search for chemical compound databases. BMC bioinformatics 16 , Suppl 18 (2015), S6 . Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, et al. 2015. Privacy-preserving search for chemical compound databases. BMC bioinformatics 16, Suppl 18 (2015), S6.","journal-title":"Suppl"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btw050"},{"key":"e_1_3_2_1_57_1","volume-title":"Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search. bioR\u03c7 iv","author":"Sudo Hiroki","year":"2016","unstructured":"Hiroki Sudo , Masanobu Jimbo , Koji Nuida , and Kana Shimizu . 2016. Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search. bioR\u03c7 iv ( 2016 ). Hiroki Sudo, Masanobu Jimbo, Koji Nuida, and Kana Shimizu. 2016. Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search. bioR\u03c7 iv (2016)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-04873-4_6"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_60_1","volume-title":"5th International Workshop","volume":"2779","author":"Tsunoo Yukiyasu","year":"2003","unstructured":"Yukiyasu Tsunoo , Teruo Saito , Tomoyasu Suzaki , Maki Shigeri , and Hiroshi Miyauchi . 2003 . Cryptanalysis of DES Implemented on Computers with Cache. In Cryptographic Hardware and Embedded Systems - CHES 2003 , 5th International Workshop , Cologne, Germany, September 8--10 , 2003, Proceedings (Lecture Notes in Computer Science), Colin D. Walter, \u00c7etin Kaya Ko\u00e7, and Christof Paar (Eds.), Vol. 2779 . Springer, 62--76. Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, and Hiroshi Miyauchi. 2003. Cryptanalysis of DES Implemented on Computers with Cache. In Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8--10, 2003, Proceedings (Lecture Notes in Computer Science), Colin D. Walter, \u00c7etin Kaya Ko\u00e7, and Christof Paar (Eds.), Vol. 2779. Springer, 62--76."},{"key":"e_1_3_2_1_61_1","volume-title":"Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In International Symposium on Information Theory and Its Applications (ISITA)","author":"Tsunoo Yukiyasu","year":"2002","unstructured":"Yukiyasu Tsunoo , Etsuko Tsujihara , Kazuhiko Minematsu , and Hiroshi Miyauchi . 2002 . Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In International Symposium on Information Theory and Its Applications (ISITA) 2002. Yukiyasu Tsunoo, Etsuko Tsujihara, Kazuhiko Minematsu, and Hiroshi Miyauchi. 2002. Cryptanalysis of Block Ciphers Implemented on Computers with Cache. In International Symposium on Information Theory and Its Applications (ISITA) 2002."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2034881"},{"key":"e_1_3_2_1_63_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Yarom Yuval","year":"2014","unstructured":"Yuval Yarom and Katrina Falkner . 2014 . FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack . In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technicalsessions\/presentation\/yarom. Yuval Yarom and Katrina Falkner. 2014. FLUSH+RELOAD: A High Resolution, Low Noise, L3 Cache Side-Channel Attack. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 719--732. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technicalsessions\/presentation\/yarom."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2014.2329681"}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Incheon Republic of Korea","acronym":"ASIA CCS '18"},"container-title":["Proceedings of the 2018 on Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196552","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3196494.3196552","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:39Z","timestamp":1750208919000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3196494.3196552"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,29]]},"references-count":62,"alternative-id":["10.1145\/3196494.3196552","10.1145\/3196494"],"URL":"https:\/\/doi.org\/10.1145\/3196494.3196552","relation":{},"subject":[],"published":{"date-parts":[[2018,5,29]]},"assertion":[{"value":"2018-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}