{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:28:01Z","timestamp":1771511281348,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["ERC-2015-AdG-IMPaCT"],"award-info":[{"award-number":["ERC-2015-AdG-IMPaCT"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["HR001120C0085"],"award-info":[{"award-number":["HR001120C0085"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CyberSecurity Research Flanders","award":["VR20192203"],"award-info":[{"award-number":["VR20192203"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484754","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:34Z","timestamp":1636805134000},"page":"594-609","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving"],"prefix":"10.1145","author":[{"given":"Cyprien","family":"Delpech de Saint Guilhem","sequence":"first","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]},{"given":"Eleftheria","family":"Makri","sequence":"additional","affiliation":[{"name":"KU Leuven &amp; Saxion University of Applied Sciences, Leuven, Belgium"}]},{"given":"Dragos","family":"Rotaru","sequence":"additional","affiliation":[{"name":"KU Leuven &amp; Cape Privacy, New York, NY, USA"}]},{"given":"Titouan","family":"Tanguy","sequence":"additional","affiliation":[{"name":"KU Leuven, Leuven, Belgium"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45708-9_27"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--38471--5_12"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--96884--1_25"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052253"},{"key":"e_1_3_2_2_6_1","unstructured":"Lennart Braun Daniel Demmler Thomas Schneider and Oleksandr Tkachenko. 2020. MOTION - A Framework for Mixed-Protocol Multi-Party Computation. Cryptology ePrint Archive Report 2020\/1137. https:\/\/eprint.iacr.org\/2020\/1137."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--56877--1_3"},{"key":"e_1_3_2_2_8_1","first-page":"374","article-title":"b. Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority","volume":"2020","author":"Chen Megan","year":"2020","unstructured":"Megan Chen, Carmit Hazay, Yuval Ishai, Yuriy Kashnikov, Daniele Micciancio, Tarik Riviere, Abhi Shelat, Muthuramakrishnan Venkitasubramaniam, and Ruihan Wang. 2020 b. Diogenes: Lightweight Scalable RSA Modulus Generation with a Dishonest Majority. IACR Cryptol. ePrint Arch., Vol. 2020 (2020), 374.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--96878-0_2"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_32"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--40203--6_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--642--11799--2_12"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460050407"},{"key":"e_1_3_2_2_14_1","volume-title":"ISW'97 (LNCS","author":"Desmedt Yvo","unstructured":"Yvo Desmedt. 1998. Some Recent Research Aspects of Threshold Cryptography (Invited Lecture). In ISW'97 (LNCS, Vol. 1396), Eiji Okamoto, George I. Davida, and Masahiro Mambo (Eds.). Springer, Heidelberg, 158--173."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/0--387--34805-0_28"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277779"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--96881-0_12"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_8"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/277697.277716"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--48405--1_8"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978332"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27954-6_20"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-017--9275--7"},{"key":"e_1_3_2_2_24_1","unstructured":"Lukas Helminger Daniel Kales Sebastian Ramacher and Roman Walch. 2020. Multi-Party Revocation in Sovrin: Performance through Distributed Trust. Cryptology ePrint Archive Report 2020\/724. https:\/\/eprint.iacr.org\/2020\/724."},{"key":"e_1_3_2_2_25_1","volume-title":"Introduction to Modern Cryptography","author":"Katz Jonathan","unstructured":"Jonathan Katz and Yehuda Lindell. 2020. Introduction to Modern Cryptography. CRC press."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--78372--7_6"},{"key":"e_1_3_2_2_29_1","volume-title":"Experimenting with Shared Generation of RSA Keys. In NDSS'99","author":"Malkin Michael","year":"1999","unstructured":"Michael Malkin, Thomas D. Wu, and Dan Boneh. 1999. Experimenting with Shared Generation of RSA Keys. In NDSS'99. The Internet Society."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2019.60"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49649-1_2"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055722"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1215\/ijm\/1255631807"},{"key":"e_1_3_2_2_35_1","unstructured":"Dragos Rotaru Nigel P. Smart Titouan Tanguy Frederik Vercauteren and Tim Wood. 2019. Actively Secure Setup for SPDZ. Cryptology ePrint Archive Report 2019\/1300. https:\/\/eprint.iacr.org\/2019\/1300."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_31"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--35199--1_17"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3-030--17659--4_13"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484754","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484754","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484754","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:50:25Z","timestamp":1763499025000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484754"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":39,"alternative-id":["10.1145\/3460120.3484754","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484754","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}