{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:21:14Z","timestamp":1750220474987,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Intelligence Advanced Research Projects Activity (IARPA)","award":["2019-19020700004"],"award-info":[{"award-number":["2019-19020700004"]}]},{"name":"the Director of National Intelligence (ODNI)","award":["2019-19020700004"],"award-info":[{"award-number":["2019-19020700004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3486609.3487205","type":"proceedings-article","created":{"date-parts":[[2021,11,22]],"date-time":"2021-11-22T22:14:41Z","timestamp":1637619281000},"page":"130-143","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["HACCLE: metaprogramming for secure multi-party computation"],"prefix":"10.1145","author":[{"given":"Yuyan","family":"Bao","sequence":"first","affiliation":[{"name":"University of Waterloo, Canada"}]},{"given":"Kirshanthan","family":"Sundararajah","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6660-6609","authenticated-orcid":false,"given":"Raghav","family":"Malik","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Qianchuan","family":"Ye","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Christopher","family":"Wagner","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Nouraldin","family":"Jaber","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Mohammad Hassan","family":"Ameri","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Donghang","family":"Lu","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Alexander","family":"Seto","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Benjamin","family":"Delaware","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Roopsha","family":"Samanta","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Christina","family":"Garman","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Jeremiah","family":"Blocki","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"given":"Pierre-David","family":"Letourneau","sequence":"additional","affiliation":[{"name":"Reservoir Labs, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1975-1376","authenticated-orcid":false,"given":"Benoit","family":"Meister","sequence":"additional","affiliation":[{"name":"Reservoir Labs, USA"}]},{"given":"Jonathan","family":"Springer","sequence":"additional","affiliation":[{"name":"Reservoir Labs, USA"}]},{"given":"Tiark","family":"Rompf","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6827-345X","authenticated-orcid":false,"given":"Milind","family":"Kulkarni","sequence":"additional","affiliation":[{"name":"Purdue University, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,11,22]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"USENIX Security Symposium. USENIX Association, 1217\u20131234","author":"Alexopoulos Nikolaos","year":"2017","unstructured":"Nikolaos Alexopoulos , Aggelos Kiayias , Riivo Talviste , and Thomas Zacharias . 2017 . MCMix: Anonymous Messaging via Secure Multiparty Computation . In USENIX Security Symposium. USENIX Association, 1217\u20131234 . http:\/\/eprint.iacr.org\/2017\/778 Nikolaos Alexopoulos, Aggelos Kiayias, Riivo Talviste, and Thomas Zacharias. 2017. MCMix: Anonymous Messaging via Secure Multiparty Computation. In USENIX Security Symposium. USENIX Association, 1217\u20131234. http:\/\/eprint.iacr.org\/2017\/778"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228584"},{"key":"e_1_3_2_2_3_1","volume-title":"Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Beno\u00eet Meister","author":"Bao Yuyan","year":"2020","unstructured":"Yuyan Bao , Kirshanthan Sundararajah , Raghav Malik , Qianchuan Ye , Christopher Wagner , Nouraldin Jaber , Fei Wang , Mohammad Hassan Ameri , Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Beno\u00eet Meister , Jonathan Springer , Tiark Rompf , and Milind Kulkarni. 2020 . HACCLE : Metaprogramming for Secure Multi-Party Computation - Extended Version . CoRR, abs\/2009.01489 (2020), arxiv:2009.01489 Yuyan Bao, Kirshanthan Sundararajah, Raghav Malik, Qianchuan Ye, Christopher Wagner, Nouraldin Jaber, Fei Wang, Mohammad Hassan Ameri, Donghang Lu, Alexander Seto, Benjamin Delaware, Roopsha Samanta, Aniket Kate, Christina Garman, Jeremiah Blocki, Pierre-David Letourneau, Beno\u00eet Meister, Jonathan Springer, Tiark Rompf, and Milind Kulkarni. 2020. HACCLE: Metaprogramming for Secure Multi-Party Computation - Extended Version. CoRR, abs\/2009.01489 (2020), arxiv:2009.01489"},{"key":"e_1_3_2_2_4_1","unstructured":"Barry Schoenmakers. 2020. MPyC: Secure multiparty computation in Python. https:\/\/github.com\/lschoe\/mpyc  Barry Schoenmakers. 2020. MPyC: Secure multiparty computation in Python. https:\/\/github.com\/lschoe\/mpyc"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/11889663_10"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_2_7_1","unstructured":"Zvika Brakerski Craig Gentry and Vinod Vaikuntanathan. 2011. Fully Homomorphic Encryption without Bootstrapping. Electron. Colloquium Comput. Complex. 111. https:\/\/eccc.weizmann.ac.il\/report\/2011\/111  Zvika Brakerski Craig Gentry and Vinod Vaikuntanathan. 2011. Fully Homomorphic Encryption without Bootstrapping. Electron. Colloquium Comput. Complex. 111. https:\/\/eccc.weizmann.ac.il\/report\/2011\/111"},{"key":"e_1_3_2_2_8_1","volume-title":"Dimitropoulos","author":"Burkhart Martin","year":"2010","unstructured":"Martin Burkhart , Mario Strasser , Dilip Many , and Xenofontas A . Dimitropoulos . 2010 . SEPIA : Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In USENIX Security Symposium. USENIX Association , 223\u2013240. http:\/\/www.usenix.org\/events\/sec10\/tech\/full_papers\/Burkhart.pdf Martin Burkhart, Mario Strasser, Dilip Many, and Xenofontas A. Dimitropoulos. 2010. SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics. In USENIX Security Symposium. USENIX Association, 223\u2013240. http:\/\/www.usenix.org\/events\/sec10\/tech\/full_papers\/Burkhart.pdf"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00043"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"key":"e_1_3_2_2_13_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/","author":"Chillotti Ilaria","year":"2016","unstructured":"Ilaria Chillotti , Nicolas Gama , Mariya Georgieva , and Malika Izabach\u00e8ne . August 2016 . TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/ Ilaria Chillotti, Nicolas Gama, Mariya Georgieva, and Malika Izabach\u00e8ne. August 2016. TFHE: Fast Fully Homomorphic Encryption Library. https:\/\/tfhe.github.io\/tfhe\/"},{"key":"e_1_3_2_2_14_1","unstructured":"Geoffroy Couteau. 2016. Efficient Secure Comparison Protocols.. IACR Cryptol. ePrint Arch. 544. http:\/\/eprint.iacr.org\/2016\/544  Geoffroy Couteau. 2016. Efficient Secure Comparison Protocols.. IACR Cryptol. ePrint Arch. 544. http:\/\/eprint.iacr.org\/2016\/544"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314628"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978373"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3360583"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1561\/3300000019"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_19"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098835"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1684"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382278"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Karthik A Jagadeesh David J Wu Johannes A Birgmeier Dan Boneh and Gill Bejerano. 2017. Deriving genomic diagnoses without revealing patient genomes. Science.  Karthik A Jagadeesh David J Wu Johannes A Birgmeier Dan Boneh and Gill Bejerano. 2017. Deriving genomic diagnoses without revealing patient genomes. Science.","DOI":"10.1126\/science.aam9710"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296979.3192379"},{"key":"e_1_3_2_2_28_1","unstructured":"Benjamin Kreuter. 2017. Secure MPC at Google. Real World Crypto.  Benjamin Kreuter. 2017. Secure MPC at Google. Real World Crypto."},{"key":"e_1_3_2_2_29_1","unstructured":"KU Leuven. 2019. SCALE-MAMBA Software. https:\/\/homes.esat.kuleuven.be\/ nsmart\/SCALE\/  KU Leuven. 2019. SCALE-MAMBA Software. https:\/\/homes.esat.kuleuven.be\/ nsmart\/SCALE\/"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00092"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354238"},{"key":"e_1_3_2_2_33_1","volume-title":"Fairplay - Secure Two-Party Computation System. In USENIX Security Symposium. USENIX, 287\u2013302","author":"Malkhi Dahlia","year":"2004","unstructured":"Dahlia Malkhi , Noam Nisan , Benny Pinkas , and Yaron Sella . 2004 . Fairplay - Secure Two-Party Computation System. In USENIX Security Symposium. USENIX, 287\u2013302 . http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec04\/tech\/malkhi.html Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. 2004. Fairplay - Secure Two-Party Computation System. In USENIX Security Symposium. USENIX, 287\u2013302. http:\/\/www.usenix.org\/publications\/library\/proceedings\/sec04\/tech\/malkhi.html"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243760"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10230-1_14"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3018882.3018891"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1868294.1868314"},{"key":"e_1_3_2_2_39_1","unstructured":"Victor Shoup Shai Halevi. April 2013. HElib: Design and Implementation of a Homomorophic-Encryption Library. https:\/\/github.com\/shaih\/HElib  Victor Shoup Shai Halevi. April 2013. HElib: Design and Implementation of a Homomorophic-Encryption Library. https:\/\/github.com\/shaih\/HElib"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25935-0_3"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00053-0"},{"key":"e_1_3_2_2_43_1","unstructured":"Multiparty.org Development Team. 2020. JavaScript implementation of federated functionalities. https:\/\/github.com\/multiparty\/jiff  Multiparty.org Development Team. 2020. JavaScript implementation of federated functionalities. https:\/\/github.com\/multiparty\/jiff"},{"key":"e_1_3_2_2_44_1","unstructured":"The PALISADE team. 2021. PALISADE homomorphic encryption softare library. https:\/\/palisade-crypto.org\/  The PALISADE team. 2021. PALISADE homomorphic encryption softare library. https:\/\/palisade-crypto.org\/"},{"key":"e_1_3_2_2_45_1","unstructured":"The VIFF team. 2021. VIFF the virtual ideal functionality framework. http:\/\/viff.dk\/  The VIFF team. 2021. VIFF the virtual ideal functionality framework. http:\/\/viff.dk\/"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6261.1961.tb02789.x"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"e_1_3_2_2_48_1","unstructured":"Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit  Xiao Wang Alex J. Malozemoff and Jonathan Katz. 2016. EMP-toolkit: Efficient MultiParty computation toolkit. https:\/\/github.com\/emp-toolkit"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813725"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"e_1_3_2_2_51_1","unstructured":"Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. IACR Cryptol. ePrint Arch. 1153. http:\/\/eprint.iacr.org\/2015\/1153  Samee Zahur and David Evans. 2015. Obliv-C: A Language for Extensible Data-Oblivious Computation. IACR Cryptol. ePrint Arch. 1153. http:\/\/eprint.iacr.org\/2015\/1153"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516752"}],"event":{"name":"GPCE '21: Concepts and Experiences","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Chicago IL USA","acronym":"GPCE '21"},"container-title":["Proceedings of the 20th ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486609.3487205","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486609.3487205","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:40Z","timestamp":1750193320000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486609.3487205"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":52,"alternative-id":["10.1145\/3486609.3487205","10.1145\/3486609"],"URL":"https:\/\/doi.org\/10.1145\/3486609.3487205","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-11-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}