{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:10Z","timestamp":1750220650432,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,20]],"date-time":"2019-11-20T00:00:00Z","timestamp":1574208000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11,20]]},"DOI":"10.1145\/3372454.3372467","type":"proceedings-article","created":{"date-parts":[[2020,1,21]],"date-time":"2020-01-21T12:17:26Z","timestamp":1579609046000},"page":"60-66","source":"Crossref","is-referenced-by-count":0,"title":["MPCC"],"prefix":"10.1145","author":[{"given":"Philip","family":"Kaiser","sequence":"first","affiliation":[{"name":"Chemnitz University of Technology, Chemnitz, Germany"}]},{"given":"Andr\u00e9","family":"Langer","sequence":"additional","affiliation":[{"name":"Chemnitz University of Technology, Chemnitz, Germany"}]},{"given":"Martin","family":"Gaedke","sequence":"additional","affiliation":[{"name":"Chemnitz University of Technology, Chemnitz, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,1,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aly A. Keller M. Orsini E. Rotaru D. Scholl P. Smart N.P. and Wood. T. 2019. SCALE-MAMBA v1.3: Documentation. Aly A. Keller M. Orsini E. Rotaru D. Scholl P. Smart N.P. and Wood. T. 2019. SCALE-MAMBA v1.3: Documentation."},{"key":"e_1_3_2_1_2_1","unstructured":"Archer D. Chen L. Hee Cheon J. Gilad-Bachrach R. A. Hallman R. Huang Z. Jiang X. Kumaresan R. A. Malin B. Sofia H. Song Y. and Shuang Wang. 2017. APPLICATIONS OF HOMOMORPHIC ENCRYPTION. (2017). Archer D. Chen L. Hee Cheon J. Gilad-Bachrach R. A. Hallman R. Huang Z. Jiang X. Kumaresan R. A. Malin B. Sofia H. Song Y. and Shuang Wang. 2017. APPLICATIONS OF HOMOMORPHIC ENCRYPTION. (2017)."},{"key":"e_1_3_2_1_3_1","unstructured":"Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing (STOC '90) New York NY USA 11. https:\/\/doi.org\/10.1145\/100216.100287 Proceedings of the Twenty-second Annual ACM Symposium on Theory of Computing (STOC '90) D. Beaver S. Micali P Rogaway 1990. The Round Complexity of Secure Protocols"},{"key":"e_1_3_2_1_4_1","unstructured":"Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08) New York NY USA 10. Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS '08) A. Ben-David N. Nisan B Pinkas 2008. FairplayMP: A System for Secure Multi-party Computation"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"e_1_3_2_1_6_1","unstructured":"Bogdanov D. 2013. Sharemind: programmable secure computations with practical applications. Ph.D. Dissertation. Bogdanov D. 2013. Sharemind: programmable secure computations with practical applications. Ph.D. Dissertation."},{"key":"e_1_3_2_1_7_1","unstructured":"Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security (ESORICS '08) Springer-Verlag Berlin Heidelberg. Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security (ESORICS '08) D. Bogdanov S. Laur J Willemson 2008. Sharemind: A Framework for Fast Privacy-Preserving Computations"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Bogdanov D. Talviste R. and Willemson J.. 2012. Deploying Secure Multi-Party Computation for Financial Data Analysis. Financial Cryptography and Data Security Angelos D. Keromytis (Ed.). Springer Berlin Heidelberg Berlin Heidelberg. Bogdanov D. Talviste R. and Willemson J.. 2012. Deploying Secure Multi-Party Computation for Financial Data Analysis. Financial Cryptography and Data Security Angelos D. Keromytis (Ed.). Springer Berlin Heidelberg Berlin Heidelberg.","DOI":"10.1007\/978-3-642-32946-3_5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Bogetoft P. Lund Christensen D. Damg\u00e5rd I. Geisler M. Ja kobsen T. Kr\u00f8igaard M. Dam Nielsen J. Buus Nielsen J. Nielsen K. Pagter J. Schwartzbach M. and Toft T. 2009. Secure Multiparty Computation Goes Live. Financial Cryptography and Data Security Roger Dingledine and Philippe Golle (Eds.). Springer-Verlag. Bogetoft P. Lund Christensen D. Damg\u00e5rd I. Geisler M. Ja kobsen T. Kr\u00f8igaard M. Dam Nielsen J. Buus Nielsen J. Nielsen K. Pagter J. Schwartzbach M. and Toft T. 2009. Secure Multiparty Computation Goes Live. Financial Cryptography and Data Security Roger Dingledine and Philippe Golle (Eds.). Springer-Verlag.","DOI":"10.1007\/978-3-642-03549-4_20"},{"key":"e_1_3_2_1_10_1","unstructured":"Brakerski Z. Gentry C. and Vaikuntanathan V. 2011. Fully Homomorphic Encryption without Bootstrapping. Cryptology ePrint Archive Report 2011\/277. (2011). Brakerski Z. Gentry C. and Vaikuntanathan V. 2011. Fully Homomorphic Encryption without Bootstrapping. Cryptology ePrint Archive Report 2011\/277. (2011)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Cramer R. Damg\u00e5rd I. and Nielsen J. 2015. Secure Multiparty Computation and Secret Sharing (1 ed.). Vol. 1. Cambridge University Press. ISBN: 9781107043053. Cramer R. Damg\u00e5rd I. and Nielsen J. 2015. Secure Multiparty Computation and Secret Sharing (1 ed.). Vol. 1. Cambridge University Press. ISBN: 9781107043053.","DOI":"10.1017\/CBO9781107337756"},{"key":"e_1_3_2_1_12_1","unstructured":"Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (Irvine). Springer-Verlag Berlin Heidelberg 20. Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09 (Irvine). Springer-Verlag I. Damg\u00e5rd M. Geisler M. Kr\u00f8igaard J. Buus Nielsen Asynchronous Multiparty Computation: Theory and Implementation 2009"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I. Pastro V. Smart N. and Zakarias S. 2012. Multiparty Computation from Somewhat Homomorphic Encryption. Advances in Cryptology -- CRYPTO 2012 Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg Berlin Heidelberg. Damg\u00e5rd I. Pastro V. Smart N. and Zakarias S. 2012. Multiparty Computation from Somewhat Homomorphic Encryption. Advances in Cryptology -- CRYPTO 2012 Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg Berlin Heidelberg.","DOI":"10.1007\/978-3-642-32009-5_38"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Halevi S. and Shoup V. 2014. Algorithms in HElib. Advances in Cryptology - CRYPTO 2014. Springer Berlin Heidelberg. Halevi S. and Shoup V. 2014. Algorithms in HElib. Advances in Cryptology - CRYPTO 2014. Springer Berlin Heidelberg.","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"e_1_3_2_1_15_1","unstructured":"Hirt M. and Maurer U. 2009. Kryptographische Protokolle. https:\/\/www.crypto.ethz.ch\/teaching\/lectures\/KP17\/script\/CP09_script.pdf Lecture notes. Hirt M. and Maurer U. 2009. Kryptographische Protokolle. https:\/\/www.crypto.ethz.ch\/teaching\/lectures\/KP17\/script\/CP09_script.pdf Lecture notes."},{"key":"e_1_3_2_1_16_1","unstructured":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) New York NY USA 13. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16) M. Keller E. Orsini P Scholl 2016. MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer"},{"key":"e_1_3_2_1_17_1","unstructured":"Kerschbaum F. 2010. A Privacy-Preserving Benchmarking Platform. Ph.D. Dissertation. Kerschbaum F. 2010. A Privacy-Preserving Benchmarking Platform. Ph.D. Dissertation."},{"key":"e_1_3_2_1_18_1","unstructured":"Proceedings of the 13th Conference on USENIX Security Symposium - Association Berkeley CA USA. Proceedings of the 13th Conference on USENIX Security Symposium - 13 D. Malkhi N. Nisan B. Pinkas Y Sella 2004. Fairplay--a Secure Two-party Computation System"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Reistad T. I. and Toft T. 2009. Secret Sharing Comparison by Trans-formation and Rotation. Information Theoretic Security Yvo Desmedt (Ed.). Springer Berlin Heidelberg Berlin Heidelberg. Reistad T. I. and Toft T. 2009. Secret Sharing Comparison by Trans-formation and Rotation. Information Theoretic Security Yvo Desmedt (Ed.). Springer Berlin Heidelberg Berlin Heidelberg.","DOI":"10.1007\/978-3-642-10230-1_14"},{"key":"e_1_3_2_1_20_1","unstructured":"SAP SE. 2019. SAP Cloud Platform Service Description. (2019). https:\/\/cloudplatform.sap.com\/support\/service-description.html (visited: 30\/03\/2019). SAP SE. 2019. SAP Cloud Platform Service Description. (2019). https:\/\/cloudplatform.sap.com\/support\/service-description.html (visited: 30\/03\/2019)."},{"key":"e_1_3_2_1_21_1","unstructured":"Schr\u00f6pfer A. 2012. Laufzeitmodell und Protokollsprache zur Erh\u00f6hung der Einsatzf\u00e4higkeit Sicherer Zwei-Parteien-Berechnung. Ph.D. Dissertation. University of Freiburg. http:\/\/www.dr.hut-verlag.de\/978-3-8439-0543-5.html Schr\u00f6pfer A. 2012. Laufzeitmodell und Protokollsprache zur Erh\u00f6hung der Einsatzf\u00e4higkeit Sicherer Zwei-Parteien-Berechnung. Ph.D. Dissertation. University of Freiburg. http:\/\/www.dr.hut-verlag.de\/978-3-8439-0543-5.html"},{"key":"e_1_3_2_1_22_1","unstructured":"VIFF Development Team. 2019. VIFF Official Homepage. (2019). http:\/\/viff.dk\/doc\/ (visited: 01\/03\/2019) ) VIFF Development Team. 2019. VIFF Official Homepage. (2019). http:\/\/viff.dk\/doc\/ (visited: 01\/03\/2019) )"}],"event":{"name":"ICBDR 2019: 2019 The 3rd International Conference on Big Data Research","sponsor":["Shandong Univ. Shandong University","The University of Versailles Saint-Quentin The University of Versailles Saint-Quentin, Versailles, France"],"location":"Cergy-Pontoise France","acronym":"ICBDR 2019"},"container-title":["Proceedings of the 2019 3rd International Conference on Big Data Research"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372454.3372467","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:22Z","timestamp":1750197742000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/doi\/10.1145\/3372454.3372467"}},"subtitle":["Generic Secure Multi-Party Computation in Centralized Cloud-based Environments"],"short-title":[],"issued":{"date-parts":[[2019,11,20]]},"references-count":22,"alternative-id":["10.1145\/3372454.3372467","10.1145\/3372454"],"URL":"https:\/\/doi.org\/10.1145\/3372454.3372467","relation":{},"subject":[],"published":{"date-parts":[[2019,11,20]]}}}