{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T15:58:19Z","timestamp":1773331099819,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3339264","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["SET-OT"],"prefix":"10.1145","author":[{"given":"Ferhat","family":"Karako\u00e7","sequence":"first","affiliation":[{"name":"Kuveyt T\u00fcrk Participation Bank Research &amp; Development Center, Kocaeli, Turkey"}]},{"given":"Majid","family":"Nateghizad","sequence":"additional","affiliation":[{"name":"Cyber Security Group, Department of Intelligent Systems, Delft University of Technology, Delft, The Netherlands"}]},{"given":"Zekeriya","family":"Erkin","sequence":"additional","affiliation":[{"name":"Cyber Security Group, Department of Intelligent Systems, Delft University of Technology, Delft, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"e_1_3_2_1_2_1","volume-title":"SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings (Lecture Notes in Computer Science), Dario Catalano and Roberto De Prisco (Eds.)","volume":"11035","author":"Ciampi Michele","year":"2018"},{"key":"e_1_3_2_1_3_1","volume-title":"ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings (Lecture Notes in Computer Science), Bart Preneel and Frederik Vercauteren (Eds.)","volume":"10892","author":"Couteau Geoffroy","year":"2018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2013.6707795"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"e_1_3_2_1_6_1","volume-title":"The Foundations of Cryptography -","author":"Goldreich Oded"},{"key":"e_1_3_2_1_7_1","volume-title":"Efficient Secure Two-Party Protocols - Techniques and Constructions","author":"Hazay Carmit"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508037.2508048"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2017.06.001"},{"key":"e_1_3_2_1_10_1","volume-title":"23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings (Lecture Notes in Computer Science), Dan Boneh (Ed.)","volume":"2729","author":"Ishai Yuval","year":"2003"},{"key":"e_1_3_2_1_11_1","volume-title":"USA","volume":"8043","author":"Kolesnikov Vladimir","year":"2013"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10433-6_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.09.013"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1191"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","volume-title":"Tutorials on the Foundations of Cryptography.","author":"Lindell Yehuda","DOI":"10.1007\/978-3-319-57048-8"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39212-2_56"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230833.3230866"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760564.1760595"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154794"},{"key":"e_1_3_2_1_23_1","volume-title":"12th International Conference","author":"Sadeghi Ahmad-Reza","year":"2009"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_31"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/sec.418"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.03.007"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11925-5_9"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 2005 SIAM International Conference on Data Mining, SDM 2005","author":"Yang Zhiqiang","year":"2005"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339264","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3339264","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:17Z","timestamp":1750203857000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3339264"}},"subtitle":["A Secure Equality Testing Protocol Based on Oblivious Transfer"],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":27,"alternative-id":["10.1145\/3339252.3339264","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3339264","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}