{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:42Z","timestamp":1750220682471,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union H2020 PAPAYA Innovation Program Grant","award":["786767"],"award-info":[{"award-number":["786767"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,28]]},"DOI":"10.1145\/3445970.3451151","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:53:22Z","timestamp":1618041202000},"page":"5-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["WeStat: a Privacy-Preserving Mobile Data Usage Statistics System"],"prefix":"10.1145","author":[{"given":"S\u00e9bastien","family":"Canard","sequence":"first","affiliation":[{"name":"Orange Labs -- Applied Crypto Group, Caen , France"}]},{"given":"Nicolas","family":"Desmoulins","sequence":"additional","affiliation":[{"name":"Orange Labs - Applied Crypto Group, Caen , France"}]},{"given":"S\u00e9bastien","family":"Hallay","sequence":"additional","affiliation":[{"name":"Orange Labs - Applied Crypto Group, Caen, France"}]},{"given":"Adel","family":"Hamdi","sequence":"additional","affiliation":[{"name":"Orange Labs - Applied Crypto Group, ENS de Lyon - LIP, Caen &amp; Lyon, France"}]},{"given":"Dominique","family":"Le Hello","sequence":"additional","affiliation":[{"name":"Orange Labs - Applied Crypto Group, Caen, France"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"D. F. Aranha C. P. L. Gouv\u00eaa T. Markmann R. S. Wahby and K. Liao. [n.d.]. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic.  D. F. Aranha C. P. L. Gouv\u00eaa T. Markmann R. S. Wahby and K. Liao. [n.d.]. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"e_1_3_2_1_3_1","volume-title":"12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11--12","volume":"331","author":"Paulo S. L.","year":"2005","unstructured":"Paulo S. L. M. Barreto and Michael Naehrig. 2005. Pairing-Friendly Elliptic Curves of Prime Order. In Selected Areas in Cryptography , 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11--12 , 2005 , Revised Selected Papers (Lecture Notes in Computer Science , Vol. 3897), Bart Preneel and Stafford E. Tavares (Eds.). Springer, 319-- 331 . https:\/\/doi.org\/10.1007\/11693383_22 10.1007\/11693383_22 Paulo S. L. M. Barreto and Michael Naehrig. 2005. Pairing-Friendly Elliptic Curves of Prime Order. In Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11--12, 2005, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 3897), Bart Preneel and Stafford E. Tavares (Eds.). Springer, 319--331. https:\/\/doi.org\/10.1007\/11693383_22"},{"key":"e_1_3_2_1_4_1","volume-title":"FC 2012, Kralendijk, Bonaire, Februray 27-March 2","volume":"214","author":"Hubert Chan T.-H.","year":"2012","unstructured":"T.-H. Hubert Chan , Elaine Shi , and Dawn Song . 2012 . Privacy-Preserving Stream Aggregation with Fault Tolerance. In Financial Cryptography and Data Security - 16th International Conference , FC 2012, Kralendijk, Bonaire, Februray 27-March 2 , 2012, Revised Selected Papers (Lecture Notes in Computer Science , Vol. 7397), Angelos D. Keromytis (Ed.). Springer, 200-- 214 . T.-H. Hubert Chan, Elaine Shi, and Dawn Song. 2012. Privacy-Preserving Stream Aggregation with Fault Tolerance. In Financial Cryptography and Data Security - 16th International Conference, FC 2012, Kralendijk, Bonaire, Februray 27-March 2, 2012, Revised Selected Papers (Lecture Notes in Computer Science, Vol. 7397), Angelos D. Keromytis (Ed.). Springer, 200--214."},{"key":"e_1_3_2_1_5_1","volume-title":"CRYPTO 2020, Santa Barbara, CA, USA, August 17--21, 2020, Proceedings, Part I (Lecture Notes in Computer Science","volume":"775","author":"Chotard J\u00e9","year":"2020","unstructured":"J\u00e9 r\u00e9 my Chotard , Edouard Dufour-Sans , Romain Gay , Duong Hieu Phan , and David Pointcheval . 2020 . Dynamic Decentralized Functional Encryption. In Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference , CRYPTO 2020, Santa Barbara, CA, USA, August 17--21, 2020, Proceedings, Part I (Lecture Notes in Computer Science , Vol. 12170), Daniele Micciancio and Thomas Ristenpart (Eds.). Springer, 747-- 775 . J\u00e9 r\u00e9 my Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, and David Pointcheval. 2020. Dynamic Decentralized Functional Encryption. In Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17--21, 2020, Proceedings, Part I (Lecture Notes in Computer Science, Vol. 12170), Daniele Micciancio and Thomas Ristenpart (Eds.). Springer, 747--775."},{"key":"e_1_3_2_1_6_1","volume-title":"Romain Gay, Duong Hieu Phan, and David Pointcheval.","author":"Chotard J\u00e9r\u00e9my","year":"2018","unstructured":"J\u00e9r\u00e9my Chotard , Edouard Dufour Sans , Romain Gay, Duong Hieu Phan, and David Pointcheval. 2018 . Decentralized Multi-Client Functional Encryption for Inner Product. In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2--6, 2018, Proceedings, Part II (Lecture Notes in Computer Science , Vol. 11273), Thomas Peyrin and Steven D. Galbraith (Eds.). Springer, 703-- 732 . J\u00e9r\u00e9my Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, and David Pointcheval. 2018. Decentralized Multi-Client Functional Encryption for Inner Product. In Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2--6, 2018, Proceedings, Part II (Lecture Notes in Computer Science, Vol. 11273), Thomas Peyrin and Steven D. Galbraith (Eds.). Springer, 703--732."},{"key":"e_1_3_2_1_7_1","first-page":"760","article-title":"Curves with fast computations in the first pairing group","volume":"2020","author":"Clarisse Remi","year":"2020","unstructured":"Remi Clarisse , Sylvain Duquesne , and Olivier Sanders . 2020 . Curves with fast computations in the first pairing group . IACR Cryptol. ePrint Arch. , Vol. 2020 (2020), 760 . https:\/\/eprint.iacr.org\/2020\/760 Remi Clarisse, Sylvain Duquesne, and Olivier Sanders. 2020. Curves with fast computations in the first pairing group. IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 760. https:\/\/eprint.iacr.org\/2020\/760","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v7i3.405"},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings (Lecture Notes in Computer Science","volume":"271","author":"Freire Eduarda S. V.","unstructured":"Eduarda S. V. Freire , Dennis Hofheinz , Eike Kiltz , and Kenneth G. Paterson . 2013. Non-Interactive Key Exchange. In Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013 . Proceedings (Lecture Notes in Computer Science , Vol. 7778), Kaoru Kurosawa and Goichiro Hanaoka (Eds.). Springer, 254-- 271 . Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, and Kenneth G. Paterson. 2013. Non-Interactive Key Exchange. In Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings (Lecture Notes in Computer Science, Vol. 7778), Kaoru Kurosawa and Goichiro Hanaoka (Eds.). Springer, 254--271."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_32"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_12_1","volume-title":"Chameleon Signatures. In Proceedings of the Network and Distributed System Security Symposium, NDSS","author":"Krawczyk Hugo","year":"2000","unstructured":"Hugo Krawczyk and Tal Rabin . 2000 . Chameleon Signatures. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA. The Internet Society. Hugo Krawczyk and Tal Rabin. 2000. Chameleon Signatures. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2000, San Diego, California, USA. The Internet Society."}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the 2021 ACM Workshop on Security and Privacy Analytics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445970.3451151","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3445970.3451151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:25Z","timestamp":1750197805000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3445970.3451151"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":12,"alternative-id":["10.1145\/3445970.3451151","10.1145\/3445970"],"URL":"https:\/\/doi.org\/10.1145\/3445970.3451151","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}