{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:10:36Z","timestamp":1755839436218,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3559369","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1843-1856","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["PentaGOD"],"prefix":"10.1145","author":[{"given":"Nishat","family":"Koti","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Varsha Bhat","family":"Kukkala","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Arpita","family":"Patra","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Bhavish","family":"Raj Gopal","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Bar Alon Eran Omri and Anat Paskin-Cherniavsky. 2020. MPC with Friends and Foes. In CRYPTO.  Bar Alon Eran Omri and Anat Paskin-Cherniavsky. 2020. MPC with Friends and Foes. In CRYPTO.","DOI":"10.1007\/978-3-030-56880-1_24"},{"volume-title":"Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier","author":"Araki Toshinori","key":"e_1_3_2_2_2_1","unstructured":"Toshinori Araki , Assi Barak , Jun Furukawa , Tamar Lichter , Yehuda Lindell , Ariel Nof , Kazuma Ohara , Adi Watzman , and Or Weinstein . 2017. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier . In IEEE S &P. Toshinori Araki, Assi Barak, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, and Or Weinstein. 2017. Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier. In IEEE S&P."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Toshinori Araki Jun Furukawa Yehuda Lindell Ariel Nof and Kazuma Ohara. 2016. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. In ACM CCS.  Toshinori Araki Jun Furukawa Yehuda Lindell Ariel Nof and Kazuma Ohara. 2016. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. In ACM CCS.","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"crossref","unstructured":"Venkat Arun Aniket Kate Deepak Garg Peter Druschel and Bobby Bhattacharjee. 2020. Finding Safety in Numbers with Secure Allegation Escrows. In NDSS.  Venkat Arun Aniket Kate Deepak Garg Peter Druschel and Bobby Bhattacharjee. 2020. Finding Safety in Numbers with Secure Allegation Escrows. In NDSS.","DOI":"10.14722\/ndss.2020.24331"},{"key":"e_1_3_2_2_5_1","volume-title":"Antigoni Polychroniadou, and Manuela Veloso.","author":"Asharov Gilad","year":"2020","unstructured":"Gilad Asharov , Tucker Hybinette Balch , Antigoni Polychroniadou, and Manuela Veloso. 2020 . Privacy-Preserving Dark Pools. In AAMAS. Gilad Asharov, Tucker Hybinette Balch, Antigoni Polychroniadou, and Manuela Veloso. 2020. Privacy-Preserving Dark Pools. In AAMAS."},{"key":"e_1_3_2_2_6_1","volume-title":"User-centric distributed solutions for privacy-preserving analytics. Communications of ACM","author":"Bestavros Azer","year":"2017","unstructured":"Azer Bestavros , Andrei Lapets , and Mayank Varia . 2017. User-centric distributed solutions for privacy-preserving analytics. Communications of ACM ( 2017 ). Azer Bestavros, Andrei Lapets, and Mayank Varia. 2017. User-centric distributed solutions for privacy-preserving analytics. Communications of ACM (2017)."},{"key":"e_1_3_2_2_7_1","volume-title":"Sander Siim, and Meril Vaht.","author":"Bogdanov Dan","year":"2015","unstructured":"Dan Bogdanov , Marko J oemets , Sander Siim, and Meril Vaht. 2015 . How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. In FC. Dan Bogdanov, Marko J oemets, Sander Siim, and Meril Vaht. 2015. How the Estonian Tax and Customs Board Evaluated a Tax Fraud Detection System Based on Secure Multi-party Computation. In FC."},{"key":"e_1_3_2_2_8_1","volume-title":"Ivan Damg\u00e5rd, Martin Geisler, Thomas Jakobsen, Mikkel Kr\u00f8igaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, et al.","author":"Bogetoft Peter","year":"2009","unstructured":"Peter Bogetoft , Dan Lund Christensen , Ivan Damg\u00e5rd, Martin Geisler, Thomas Jakobsen, Mikkel Kr\u00f8igaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, et al. 2009 . Secure multiparty computation goes live. In FC. Peter Bogetoft, Dan Lund Christensen, Ivan Damg\u00e5rd, Martin Geisler, Thomas Jakobsen, Mikkel Kr\u00f8igaard, Janus Dam Nielsen, Jesper Buus Nielsen, Kurt Nielsen, Jakob Pagter, et al. 2009. Secure multiparty computation goes live. In FC."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In CRYPTO.  Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In CRYPTO.","DOI":"10.1007\/978-3-030-26954-8_3"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Elette Boyle Niv Gilboa Yuval Ishai and Ariel Nof. 2019. Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. In ACM CCS.  Elette Boyle Niv Gilboa Yuval Ishai and Ariel Nof. 2019. Practical Fully Secure Three-Party Computation via Sublinear Distributed Zero-Knowledge Proofs. In ACM CCS.","DOI":"10.1145\/3319535.3363227"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Elette Boyle Niv Gilboa Yuval Ishai and Ariel Nof. 2020. Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs. In ASIACRYPT.  Elette Boyle Niv Gilboa Yuval Ishai and Ariel Nof. 2020. Efficient Fully Secure Computation via Distributed Zero-Knowledge Proofs. In ASIACRYPT.","DOI":"10.1007\/978-3-030-64840-4_9"},{"key":"e_1_3_2_2_12_1","volume-title":"FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS","author":"Byali Megha","year":"2020","unstructured":"Megha Byali , Harsh Chaudhari , Arpita Patra , and Ajith Suresh . 2020 . FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS (2020). Megha Byali, Harsh Chaudhari, Arpita Patra, and Ajith Suresh. 2020. FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS (2020)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Megha Byali Carmit Hazay Arpita Patra and Swati Singla. 2019. Fast actively secure five-party computation with security beyond abort. In ACM CCS.  Megha Byali Carmit Hazay Arpita Patra and Swati Singla. 2019. Fast actively secure five-party computation with security beyond abort. In ACM CCS.","DOI":"10.1145\/3319535.3345657"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"crossref","unstructured":"Megha Byali Arun Joseph Arpita Patra and Divya Ravi. 2018. Fast Secure Computation for Small Population over the Internet. In ACM CCS.  Megha Byali Arun Joseph Arpita Patra and Divya Ravi. 2018. Fast Secure Computation for Small Population over the Internet. In ACM CCS.","DOI":"10.1145\/3243734.3243784"},{"key":"e_1_3_2_2_15_1","volume-title":"Nigel P Smart, and Younes Talibi Alaoui","author":"Cartlidge John","year":"2019","unstructured":"John Cartlidge , Nigel P Smart, and Younes Talibi Alaoui . 2019 . MPC joins the dark side. In ACM ASIACCS. John Cartlidge, Nigel P Smart, and Younes Talibi Alaoui. 2019. MPC joins the dark side. In ACM ASIACCS."},{"key":"e_1_3_2_2_16_1","volume-title":"Nigel P Smart, and Younes Talibi Alaoui","author":"Cartlidge John","year":"2021","unstructured":"John Cartlidge , Nigel P Smart, and Younes Talibi Alaoui . 2021 . Multi-party computation mechanism for anonymous equity block trading: A secure implementation of turquoise plato uncross. Intell. Syst. Account. Finance Manag . (2021). John Cartlidge, Nigel P Smart, and Younes Talibi Alaoui. 2021. Multi-party computation mechanism for anonymous equity block trading: A secure implementation of turquoise plato uncross. Intell. Syst. Account. Finance Manag. (2021)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358922"},{"key":"e_1_3_2_2_18_1","volume-title":"Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. NDSS","author":"Chaudhari Harsh","year":"2020","unstructured":"Harsh Chaudhari , Rahul Rachuri , and Ajith Suresh . 2020 . Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. NDSS (2020). Harsh Chaudhari, Rahul Rachuri, and Ajith Suresh. 2020. Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. NDSS (2020)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"crossref","unstructured":"Richard Cleve. 1986. Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract). In ACM STOC.  Richard Cleve. 1986. Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract). In ACM STOC.","DOI":"10.1145\/12130.12168"},{"key":"e_1_3_2_2_20_1","unstructured":"Cryptography and Privacy Engineering Group at TU Darmstadt. [n. d.]. ENCRYPTO Utils. https:\/\/github.com\/encryptogroup\/ENCRYPTO_utils.  Cryptography and Privacy Engineering Group at TU Darmstadt. [n. d.]. ENCRYPTO Utils. https:\/\/github.com\/encryptogroup\/ENCRYPTO_utils."},{"key":"e_1_3_2_2_21_1","volume-title":"Nigel P Smart, and Younes Talibi Alaoui","author":"da Gama Mariana Botelho","year":"2021","unstructured":"Mariana Botelho da Gama , John Cartlidge , Antigoni Polychroniadou , Nigel P Smart, and Younes Talibi Alaoui . 2021 . Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. IACR Cryptol. ePrint Arch . (2021). Mariana Botelho da Gama, John Cartlidge, Antigoni Polychroniadou, Nigel P Smart, and Younes Talibi Alaoui. 2021. Kicking-the-Bucket: Fast Privacy-Preserving Trading Using Buckets. IACR Cryptol. ePrint Arch. (2021)."},{"key":"e_1_3_2_2_22_1","volume-title":"Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. USENIX security.","author":"Dalskov Anders","year":"2020","unstructured":"Anders Dalskov , Daniel Escudero , and Marcel Keller . 2020 . Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. USENIX security. Anders Dalskov, Daniel Escudero, and Marcel Keller. 2020. Fantastic Four: Honest-Majority Four-Party Secure Computation With Malicious Security. USENIX security."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2007. Scalable and unconditionally secure multiparty computation. In CRYPTO.  Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2007. Scalable and unconditionally secure multiparty computation. In CRYPTO.","DOI":"10.1007\/11818175_30"},{"key":"e_1_3_2_2_24_1","unstructured":"Xiao Dong David A Randolph Chenkai Weng Abel N Kho Jennie M Rogers and Xiao Wang. 2021. Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification. In AMIA.  Xiao Dong David A Randolph Chenkai Weng Abel N Kho Jennie M Rogers and Xiao Wang. 2021. Developing High Performance Secure Multi-Party Computation Protocols in Healthcare: A Case Study of Patient Risk Stratification. In AMIA."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"crossref","unstructured":"Jun Furukawa Yehuda Lindell Ariel Nof and Or Weinstein. 2017. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. In EUROCRYPT.  Jun Furukawa Yehuda Lindell Ariel Nof and Or Weinstein. 2017. High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority. In EUROCRYPT.","DOI":"10.1007\/978-3-319-56614-6_8"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"S. Dov Gordon Samuel Ranellucci and Xiao Wang. 2018. Secure Computation with Low Communication from Cross-Checking. In ASIACRYPT.  S. Dov Gordon Samuel Ranellucci and Xiao Wang. 2018. Secure Computation with Low Communication from Cross-Checking. In ASIACRYPT.","DOI":"10.1007\/978-3-030-03332-3_3"},{"volume-title":"A private and reliable recommendation system for social networks","author":"Hoens T Ryan","key":"e_1_3_2_2_27_1","unstructured":"T Ryan Hoens , Marina Blanton , and Nitesh V Chawla . 2010. A private and reliable recommendation system for social networks . In IEEE. IEEE. T Ryan Hoens, Marina Blanton, and Nitesh V Chawla. 2010. A private and reliable recommendation system for social networks. In IEEE. IEEE."},{"key":"e_1_3_2_2_28_1","volume-title":"SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch.","author":"Koti Nishat","year":"2021","unstructured":"Nishat Koti , Mahak Pancholi , Arpita Patra , and Ajith Suresh . 2021 . SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. (2021). Nishat Koti, Mahak Pancholi, Arpita Patra, and Ajith Suresh. 2021. SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. IACR Cryptol. ePrint Arch. (2021)."},{"key":"e_1_3_2_2_29_1","volume-title":"Tetrad: Actively Secure 4PC for Secure Training and Inference. IACR Cryptol. ePrint Arch..","author":"Koti Nishat","year":"2022","unstructured":"Nishat Koti , Arpita Patra , Rahul Rachuri , and Ajith Suresh . 2022 . Tetrad: Actively Secure 4PC for Secure Training and Inference. IACR Cryptol. ePrint Arch.. Nishat Koti, Arpita Patra, Rahul Rachuri, and Ajith Suresh. 2022. Tetrad: Actively Secure 4PC for Secure Training and Inference. IACR Cryptol. ePrint Arch.."},{"key":"e_1_3_2_2_30_1","unstructured":"Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2014. The CIFAR-10 dataset. (2014). thtps:\/\/www.cs.toronto.edu\/ kriz\/cifar.html.  Alex Krizhevsky Vinod Nair and Geoffrey Hinton. 2014. The CIFAR-10 dataset. (2014). thtps:\/\/www.cs.toronto.edu\/ kriz\/cifar.html."},{"key":"e_1_3_2_2_31_1","volume-title":"Cryptography for# metoo. PETS","author":"Kuykendall Benjamin","year":"2019","unstructured":"Benjamin Kuykendall , Hugo Krawczyk , and Tal Rabin . 2019. Cryptography for# metoo. PETS ( 2019 ). Benjamin Kuykendall, Hugo Krawczyk, and Tal Rabin. 2019. Cryptography for# metoo. PETS (2019)."},{"key":"e_1_3_2_2_32_1","volume-title":"Gradient-based learning applied to document recognition. Proc","author":"LeCun Yann","year":"1998","unstructured":"Yann LeCun , L\u00e9on Bottou , Yoshua Bengio , and Patrick Haffner . 1998. Gradient-based learning applied to document recognition. Proc . IEEE ( 1998 ). Yann LeCun, L\u00e9on Bottou, Yoshua Bengio, and Patrick Haffner. 1998. Gradient-based learning applied to document recognition. Proc. IEEE (1998)."},{"key":"e_1_3_2_2_33_1","unstructured":"Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/.  Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"e_1_3_2_2_34_1","unstructured":"Payman Mohassel and Peter Rindal. 2018. ABY(3): A Mixed Protocol Framework for Machine Learning. In ACM CCS.  Payman Mohassel and Peter Rindal. 2018. ABY(3): A Mixed Protocol Framework for Machine Learning. In ACM CCS."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"crossref","unstructured":"Payman Mohassel Mike Rosulek and Ye Zhang. 2015. Fast and Secure Three-party Computation: The Garbled Circuit Approach. In ACM CCS.  Payman Mohassel Mike Rosulek and Ye Zhang. 2015. Fast and Secure Three-party Computation: The Garbled Circuit Approach. In ACM CCS.","DOI":"10.1145\/2810103.2813705"},{"volume-title":"SecureML: A System for Scalable Privacy-Preserving Machine Learning","author":"Mohassel Payman","key":"e_1_3_2_2_36_1","unstructured":"Payman Mohassel and Yupeng Zhang . 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning . In IEEE S &P. Payman Mohassel and Yupeng Zhang. 2017. SecureML: A System for Scalable Privacy-Preserving Machine Learning. In IEEE S&P."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"crossref","unstructured":"Peter Sebastian Nordholt and Meilof Veeningen. 2018. Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. In ACNS.  Peter Sebastian Nordholt and Meilof Veeningen. 2018. Minimising Communication in Honest-Majority MPC by Batchwise Multiplication Verification. In ACNS.","DOI":"10.1007\/978-3-319-93387-0_17"},{"key":"e_1_3_2_2_38_1","volume-title":"SEC institutes enforcement action against 20 former New York Stock Exchange specialists alleging pervasive course of fraudulent trading","author":"United States of America before the Securities and Exchange Commission. 2005.","year":"2005","unstructured":"United States of America before the Securities and Exchange Commission. 2005. SEC institutes enforcement action against 20 former New York Stock Exchange specialists alleging pervasive course of fraudulent trading . Press Release . https:\/\/www.sec.gov\/news\/press\/ 2005 -54.htm. United States of America before the Securities and Exchange Commission. 2005. SEC institutes enforcement action against 20 former New York Stock Exchange specialists alleging pervasive course of fraudulent trading. Press Release. https:\/\/www.sec.gov\/news\/press\/2005-54.htm."},{"key":"e_1_3_2_2_39_1","unstructured":"United States of America before the Securities and Exchange Commission. 2011. In the Matter of Pipeline Trading Systems LLC et al. Securities Exchange Act of 1934 Release No. 65609. https:\/\/www.sec.gov\/litigation\/admin\/2011\/33-9271.pdf.  United States of America before the Securities and Exchange Commission. 2011. In the Matter of Pipeline Trading Systems LLC et al. Securities Exchange Act of 1934 Release No. 65609. https:\/\/www.sec.gov\/litigation\/admin\/2011\/33-9271.pdf."},{"key":"e_1_3_2_2_40_1","unstructured":"United States of America before the Securities and Exchange Commission. 2012. In the Matter of eBX LLC Securities Exchange Act of 1934 Release No. 67979. https:\/\/www.sec.gov\/litigation\/admin\/2012\/34-67969.pdf.  United States of America before the Securities and Exchange Commission. 2012. In the Matter of eBX LLC Securities Exchange Act of 1934 Release No. 67979. https:\/\/www.sec.gov\/litigation\/admin\/2012\/34-67969.pdf."},{"key":"e_1_3_2_2_41_1","unstructured":"United States of America before the Securities and Exchange Commission. 2014a. In the Matter of LavaFlow Inc. Securities Exchange Act of 1934 Release No. 72673. https:\/\/www.sec.gov\/litigation\/admin\/2014\/34-72673. pdf.  United States of America before the Securities and Exchange Commission. 2014a. In the Matter of LavaFlow Inc. Securities Exchange Act of 1934 Release No. 72673. https:\/\/www.sec.gov\/litigation\/admin\/2014\/34-72673. pdf."},{"key":"e_1_3_2_2_42_1","unstructured":"United States of America before the Securities and Exchange Commission. 2014b. In the Matter of Liquidnet Inc. Securities Exchange Act of 1934 Release No. 72339. https:\/\/www.sec.gov\/litigation\/admin\/2014\/33-9596.pdf.  United States of America before the Securities and Exchange Commission. 2014b. In the Matter of Liquidnet Inc. Securities Exchange Act of 1934 Release No. 72339. https:\/\/www.sec.gov\/litigation\/admin\/2014\/33-9596.pdf."},{"key":"e_1_3_2_2_43_1","unstructured":"United States of America before the Securities and Exchange Commission. 2016. In the Matter of Credit Suisse Securities (USA) LLC Securities Exchange Act of 1934 Release No. 77002. https:\/\/www.sec.gov\/litigation\/admin\/2016\/33-10013.pdf.  United States of America before the Securities and Exchange Commission. 2016. In the Matter of Credit Suisse Securities (USA) LLC Securities Exchange Act of 1934 Release No. 77002. https:\/\/www.sec.gov\/litigation\/admin\/2016\/33-10013.pdf."},{"key":"e_1_3_2_2_44_1","unstructured":"United States of America before the Securities and Exchange Commission. 2018. In the Matter of ITG Inc. and Alternet Securities Inc. Securities Exchange Act of 1934 Release No. 84548. https:\/\/www.sec.gov\/litigation\/admin\/2018\/33-10572.pdf.  United States of America before the Securities and Exchange Commission. 2018. In the Matter of ITG Inc. and Alternet Securities Inc. Securities Exchange Act of 1934 Release No. 84548. https:\/\/www.sec.gov\/litigation\/admin\/2018\/33-10572.pdf."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Satsuya Ohata and Koji Nuida. 2020. Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.  Satsuya Ohata and Koji Nuida. 2020. Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.","DOI":"10.1007\/978-3-030-51280-4_20"},{"key":"e_1_3_2_2_46_1","unstructured":"Arpita Patra Thomas Schneider Ajith Suresh and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In USENIX Michael Bailey and Rachel Greenstadt (Eds.).  Arpita Patra Thomas Schneider Ajith Suresh and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In USENIX Michael Bailey and Rachel Greenstadt (Eds.)."},{"key":"e_1_3_2_2_47_1","volume-title":"BLAZE: Blazing Fast Privacy-Preserving Machine Learning. NDSS","author":"Patra Arpita","year":"2020","unstructured":"Arpita Patra and Ajith Suresh . 2020 . BLAZE: Blazing Fast Privacy-Preserving Machine Learning. NDSS (2020). Arpita Patra and Ajith Suresh. 2020. BLAZE: Blazing Fast Privacy-Preserving Machine Learning. NDSS (2020)."},{"volume-title":"Secure multiparty PageRank algorithm for collaborative fraud detection","author":"Sangers Alex","key":"e_1_3_2_2_48_1","unstructured":"Alex Sangers , Maran van Heesch , Thomas Attema , Thijs Veugen , Mark Wiggerman , Jan Veldsink , Oscar Bloemen , and Dani\u00ebl Worm . 2019. Secure multiparty PageRank algorithm for collaborative fraud detection . In FC. Springer . Alex Sangers, Maran van Heesch, Thomas Attema, Thijs Veugen, Mark Wiggerman, Jan Veldsink, Oscar Bloemen, and Dani\u00ebl Worm. 2019. Secure multiparty PageRank algorithm for collaborative fraud detection. In FC. Springer."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"crossref","unstructured":"Erez Shmueli and Tamir Tassa. 2017. Secure multi-party protocols for item-based collaborative filtering. In ACM RecSys.  Erez Shmueli and Tamir Tassa. 2017. Secure multi-party protocols for item-based collaborative filtering. In ACM RecSys.","DOI":"10.1145\/3109859.3109881"},{"key":"e_1_3_2_2_50_1","volume-title":"Very deep convolutional networks for large-scale image recognition. ICLR","author":"Simonyan Karen","year":"2015","unstructured":"Karen Simonyan and Andrew Zisserman . 2015. Very deep convolutional networks for large-scale image recognition. ICLR ( 2015 ). Karen Simonyan and Andrew Zisserman. 2015. Very deep convolutional networks for large-scale image recognition. ICLR (2015)."},{"key":"e_1_3_2_2_51_1","unstructured":"Stanford. [n. d.]. CS231n: Convolutional Neural Networks for Visual Recognition. https:\/\/cs231n.github.io\/convolutional-networks\/  Stanford. [n. d.]. CS231n: Convolutional Neural Networks for Visual Recognition. https:\/\/cs231n.github.io\/convolutional-networks\/"},{"key":"e_1_3_2_2_52_1","unstructured":"Christina-Angeliki Toli Abdelrahaman Aly and Bart Preneel. 2016. A privacy-preserving model for biometric fusion. In CANS.  Christina-Angeliki Toli Abdelrahaman Aly and Bart Preneel. 2016. A privacy-preserving model for biometric fusion. In CANS."},{"key":"e_1_3_2_2_53_1","volume-title":"FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. PoPETs","author":"Wagh Sameer","year":"2021","unstructured":"Sameer Wagh , Shruti Tople , Fabrice Benhamouda , Eyal Kushilevitz , Prateek Mittal , and Tal Rabin . 2021 . FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. PoPETs (2021). Sameer Wagh, Shruti Tople, Fabrice Benhamouda, Eyal Kushilevitz, Prateek Mittal, and Tal Rabin. 2021. FALCON: Honest-Majority Maliciously Secure Framework for Private Deep Learning. PoPETs (2021)."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559369","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559369"}},"subtitle":["Stepping beyond Traditional GOD with Five Parties"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":53,"alternative-id":["10.1145\/3548606.3559369","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3559369","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}