{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:07Z","timestamp":1750220587792,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T00:00:00Z","timestamp":1604880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["419340256"],"award-info":[{"award-number":["419340256"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["CCF-1646999"],"award-info":[{"award-number":["CCF-1646999"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,9]]},"DOI":"10.1145\/3411497.3420213","type":"proceedings-article","created":{"date-parts":[[2020,11,9]],"date-time":"2020-11-09T20:59:15Z","timestamp":1604955555000},"page":"151-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["A Privacy-Preserving Protocol for the Kidney Exchange Problem"],"prefix":"10.1145","author":[{"given":"Malte","family":"Breuer","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, NJ, USA"}]},{"given":"Anja","family":"M\u00fchlfeld","sequence":"additional","affiliation":[{"name":"University Hospital RWTH Aachen, Aachen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250910.1250954"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1421853112"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Saikrishna Badrinarayanan Peihan Miao and Peter Rindal. 2020. Multi-Party Threshold Private Set Intersection with Sublinear Communication. IACR Cryptol. ePrint Arch.  Saikrishna Badrinarayanan Peihan Miao and Peter Rindal. 2020. Multi-Party Threshold Private Set Intersection with Sublinear Communication. IACR Cryptol. ePrint Arch.","DOI":"10.1007\/978-3-030-75248-4_13"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1097\/TP.0000000000002432"},{"volume-title":"Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification","author":"Blanton Marina","key":"e_1_3_2_1_5_1","unstructured":"Marina Blanton and Siddharth Saraph . 2015. Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification . Springer . Marina Blanton and Siddharth Saraph. 2015. Oblivious Maximum Bipartite Matching Size Algorithm with Applications to Secure Fingerprint Identification. Springer."},{"key":"e_1_3_2_1_6_1","volume-title":"Nielsen","author":"Cramer Ronald","year":"2001","unstructured":"Ronald Cramer , Ivan Damg\u00e5rd , and Jesper B . Nielsen . 2001 . Multiparty Computation from Threshold Homomorphic Encryption. EUROCRYPT. Ronald Cramer, Ivan Damg\u00e5rd, and Jesper B. Nielsen. 2001. Multiparty Computation from Threshold Homomorphic Encryption. EUROCRYPT."},{"volume-title":"Annual Report","year":"2019","key":"e_1_3_2_1_7_1","unstructured":"Eurotransplant. 2020 a . Annual Report 2019 . https:\/\/www.eurotransplant.org\/wp-content\/uploads\/2020\/06\/Annual-Report-2019.pdf Eurotransplant. 2020 a. Annual Report 2019. https:\/\/www.eurotransplant.org\/wp-content\/uploads\/2020\/06\/Annual-Report-2019.pdf"},{"volume-title":"2020 b. Manual","year":"2020","key":"e_1_3_2_1_8_1","unstructured":"Eurotransplant. 2020 b. Manual , Chapter 4. http:\/\/www.eurotransplant.org\/wp-content\/uploads\/ 2020 \/01\/H4-Kidney.pdf Eurotransplant. 2020 b. Manual, Chapter 4. http:\/\/www.eurotransplant.org\/wp-content\/uploads\/2020\/01\/H4-Kidney.pdf"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Pierre-Alain Fouque Guillaume Poupard and Jacques Stern. 2001. Sharing Decryption in the Context of Voting and Lotteries. Financial Cryptography.  Pierre-Alain Fouque Guillaume Poupard and Jacques Stern. 2001. Sharing Decryption in the Context of Voting and Lotteries. Financial Cryptography.","DOI":"10.1007\/3-540-45472-1_7"},{"key":"e_1_3_2_1_10_1","unstructured":"Michael J. Freedman Kobbi Nissim and Benny Pinkas. [n.d.]. Efficient Private Matching and Set Intersection.  Michael J. Freedman Kobbi Nissim and Benny Pinkas. [n.d.]. Efficient Private Matching and Set Intersection."},{"key":"e_1_3_2_1_11_1","volume-title":"PBS: Private Bartering Systems. Financial Cryptography and Data Security.","author":"Frikken Keith","year":"2008","unstructured":"Keith Frikken and Lukasz Opyrchal . 2008 . PBS: Private Bartering Systems. Financial Cryptography and Data Security. Keith Frikken and Lukasz Opyrchal. 2008. PBS: Private Bartering Systems. Financial Cryptography and Data Security."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Satrajit Ghosh and Mark Simkin. 2019. The Communication Complexity of Threshold Private Set Intersection. CRYPTO.  Satrajit Ghosh and Mark Simkin. 2019. The Communication Complexity of Threshold Private Set Intersection. CRYPTO.","DOI":"10.1007\/978-3-030-26951-7_1"},{"volume-title":"Foundations of Cryptography","author":"Goldreich Oded","key":"e_1_3_2_1_13_1","unstructured":"Oded Goldreich . 2004. Foundations of Cryptography : Volume 2 - Basic Applications. Cambridge University Press . Oded Goldreich. 2004. Foundations of Cryptography: Volume 2 - Basic Applications. Cambridge University Press."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Philippe Golle. 2006. A Private Stable Matching Algorithm. Financial Cryptography and Data Security.  Philippe Golle. 2006. A Private Stable Matching Algorithm. Financial Cryptography and Data Security.","DOI":"10.1007\/11889663_5"},{"volume-title":"Private Pareto Optimal Exchange. ACM Transactions on Economics and Computation","author":"Kannan Sampath","key":"e_1_3_2_1_15_1","unstructured":"Sampath Kannan , Jamie Morgenstern , Ryan Rogers , and Aaron Roth . [n.d.]. Private Pareto Optimal Exchange. ACM Transactions on Economics and Computation , Vol. 6 , 12. Sampath Kannan, Jamie Morgenstern, Ryan Rogers, and Aaron Roth. [n.d.]. Private Pareto Optimal Exchange. ACM Transactions on Economics and Computation, Vol. 6, 12."},{"key":"e_1_3_2_1_16_1","unstructured":"Volker Kiefel. 2017. HLA und Transplantation. https:\/\/www.vkiefel.de\/hla.pdf  Volker Kiefel. 2017. HLA und Transplantation. https:\/\/www.vkiefel.de\/hla.pdf"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/ctr.13533"},{"key":"e_1_3_2_1_19_1","unstructured":"Georg Neugebauer and Ulrike Meyer. 2012. SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets.  Georg Neugebauer and Ulrike Meyer. 2012. SMC-MuSe: A Framework for Secure Multi-Party Computation on MultiSets."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.97.3.828"},{"key":"e_1_3_2_1_22_1","volume-title":"Privacy-Preserving Multi-Party Conditional Random Selection. Conference on Privacy, Security and Trust.","author":"W\u00fcller Stefan","year":"2019","unstructured":"Stefan W\u00fcller , Benjamin Assadsolimani , Ulrike Meyer , Fabian F\u00f6rg , and Susanne Wetzel . 2019 . Privacy-Preserving Multi-Party Conditional Random Selection. Conference on Privacy, Security and Trust. Stefan W\u00fcller, Benjamin Assadsolimani, Ulrike Meyer, Fabian F\u00f6rg, and Susanne Wetzel. 2019. Privacy-Preserving Multi-Party Conditional Random Selection. Conference on Privacy, Security and Trust."},{"key":"e_1_3_2_1_23_1","volume-title":"Privacy-Preserving Trade Chain Detection. Workshop on Data Privacy Management.","author":"W\u00fcller Stefan","year":"2018","unstructured":"Stefan W\u00fcller , Malte Breuer , Ulrike Meyer , and Susanne Wetzel . 2018 . Privacy-Preserving Trade Chain Detection. Workshop on Data Privacy Management. Stefan W\u00fcller, Malte Breuer, Ulrike Meyer, and Susanne Wetzel. 2018. Privacy-Preserving Trade Chain Detection. Workshop on Data Privacy Management."},{"key":"e_1_3_2_1_24_1","volume-title":"Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. Conference on Privacy, Security and Trust.","author":"W\u00fcller Stefan","year":"2017","unstructured":"Stefan W\u00fcller , Ulrike Meyer , and Susanne Wetzel . 2017 a. Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. Conference on Privacy, Security and Trust. Stefan W\u00fcller, Ulrike Meyer, and Susanne Wetzel. 2017a. Privacy-Preserving Multi-Party Bartering Secure Against Active Adversaries. Conference on Privacy, Security and Trust."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Stefan W\u00fcller Ulrike Meyer and Susanne Wetzel. 2017b. Towards Privacy-Preserving Multi-Party Bartering. Financial Cryptography and Data Security.  Stefan W\u00fcller Ulrike Meyer and Susanne Wetzel. 2017b. Towards Privacy-Preserving Multi-Party Bartering. Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-319-70278-0_2"},{"key":"e_1_3_2_1_26_1","volume-title":"Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities. Workshop on Privacy in the Electronic Society.","author":"W\u00fcller Stefan","year":"2017","unstructured":"Stefan W\u00fcller , Michael Vu , Ulrike Meyer , and Susanne Wetzel . 2017 c. Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities. Workshop on Privacy in the Electronic Society. Stefan W\u00fcller, Michael Vu, Ulrike Meyer, and Susanne Wetzel. 2017c. Using Secure Graph Algorithms for the Privacy-Preserving Identification of Optimal Bartering Opportunities. Workshop on Privacy in the Electronic Society."}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CCS '20"},"container-title":["Proceedings of the 19th Workshop on Privacy in the Electronic Society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420213","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411497.3420213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:41Z","timestamp":1750195901000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411497.3420213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,9]]},"references-count":24,"alternative-id":["10.1145\/3411497.3420213","10.1145\/3411497"],"URL":"https:\/\/doi.org\/10.1145\/3411497.3420213","relation":{},"subject":[],"published":{"date-parts":[[2020,11,9]]},"assertion":[{"value":"2020-11-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}