{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:05:29Z","timestamp":1762779929574,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"French ANR","award":["Crypto4Graph-AI"],"award-info":[{"award-number":["Crypto4Graph-AI"]}]},{"name":"European Community Horizon 2020","award":["966570"],"award-info":[{"award-number":["966570"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3559374","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"725-737","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection"],"prefix":"10.1145","author":[{"given":"Paola","family":"de Perthuis","sequence":"first","affiliation":[{"name":"Cosmian, DIENS, ENS\/PSL, CNRS, Inria, Paris, France"}]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[{"name":"DIENS, ENS\/PSL, CNRS, Inria, Paris, France"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Simple Functional Encryption Schemes for Inner Products. In PKC 2015 (LNCS","volume":"751","author":"Abdalla Michel","year":"2015","unstructured":"Michel Abdalla , Florian Bourse , Angelo De Caro , and David Pointcheval . 2015 . Simple Functional Encryption Schemes for Inner Products. In PKC 2015 (LNCS , Vol. 9020),, Jonathan Katz (Ed.). Springer, Heidelberg, 733-- 751 . https:\/\/doi.org\/10.1007\/978-3-662-46447-2_33 10.1007\/978-3-662-46447-2_33 Michel Abdalla, Florian Bourse, Angelo De Caro, and David Pointcheval. 2015. Simple Functional Encryption Schemes for Inner Products. In PKC 2015 (LNCS, Vol. 9020),, Jonathan Katz (Ed.). Springer, Heidelberg, 733--751. https:\/\/doi.org\/10.1007\/978-3-662-46447-2_33"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84259-8_8"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53015-3_12"},{"key":"e_1_3_2_2_4_1","volume-title":"Functional Encryption: Definitions and Challenges. In TCC 2011 (LNCS","volume":"273","author":"Boneh Dan","year":"2011","unstructured":"Dan Boneh , Amit Sahai , and Brent Waters . 2011 . Functional Encryption: Definitions and Challenges. In TCC 2011 (LNCS , Vol. 6597), Yuval Ishai (Ed.). Springer, Heidelberg, 253-- 273 . https:\/\/doi.org\/10.1007\/978-3-642-19571-6_16 10.1007\/978-3-642-19571-6_16 Dan Boneh, Amit Sahai, and Brent Waters. 2011. Functional Encryption: Definitions and Challenges. In TCC 2011 (LNCS, Vol. 6597), Yuval Ishai (Ed.). Springer, Heidelberg, 253--273. https:\/\/doi.org\/10.1007\/978-3-642-19571-6_16"},{"key":"e_1_3_2_2_5_1","volume-title":"Decentralized Multi-Client Functional Encryption for Inner Product. In ASIACRYPT","volume":"732","author":"Chotard J\u00e9r\u00e9my","year":"2018","unstructured":"J\u00e9r\u00e9my Chotard , Edouard Dufour Sans , Romain Gay , Duong Hieu Phan , and David Pointcheval . 2018 . Decentralized Multi-Client Functional Encryption for Inner Product. In ASIACRYPT 2018, Part II (LNCS , Vol. 11273),, Thomas Peyrin and Steven Galbraith (Eds.). Springer, Heidelberg, 703-- 732 . https:\/\/doi.org\/10.1007\/978-3-030-03329-3_24 10.1007\/978-3-030-03329-3_24 J\u00e9r\u00e9my Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, and David Pointcheval. 2018. Decentralized Multi-Client Functional Encryption for Inner Product. In ASIACRYPT 2018, Part II (LNCS, Vol. 11273),, Thomas Peyrin and Steven Galbraith (Eds.). Springer, Heidelberg, 703--732. https:\/\/doi.org\/10.1007\/978-3-030-03329-3_24"},{"key":"e_1_3_2_2_6_1","volume-title":"Dynamic Decentralized Functional Encryption. In CRYPTO","volume":"775","author":"Chotard J\u00e9r\u00e9my","year":"2020","unstructured":"J\u00e9r\u00e9my Chotard , Edouard Dufour-Sans , Romain Gay , Duong Hieu Phan , and David Pointcheval . 2020 . Dynamic Decentralized Functional Encryption. In CRYPTO 2020, Part I (LNCS , Vol. 12170),, Daniele Micciancio and Thomas Ristenpart (Eds.). Springer, Heidelberg, 747-- 775 . https:\/\/doi.org\/10.1007\/978-3-030-56784-2_25 10.1007\/978-3-030-56784-2_25 J\u00e9r\u00e9my Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, and David Pointcheval. 2020. Dynamic Decentralized Functional Encryption. In CRYPTO 2020, Part I (LNCS, Vol. 12170),, Daniele Micciancio and Thomas Ristenpart (Eds.). Springer, Heidelberg, 747--775. https:\/\/doi.org\/10.1007\/978-3-030-56784-2_25"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_9"},{"key":"e_1_3_2_2_9_1","volume-title":"Key-Policy ABE with Delegation of Rights. In The 13th Conference on Security in Communication Networks (SCN '22)","volume":"171","author":"Delerabl\u00e9e C\u00e9cile","year":"2022","unstructured":"C\u00e9cile Delerabl\u00e9e , L\u00e9na\u00efck Gouriou , and David Pointcheval . 2022 . Key-Policy ABE with Delegation of Rights. In The 13th Conference on Security in Communication Networks (SCN '22) (LNCS, Vol. 13409), Clemente Galdi and Stanislaw Jarecki (Eds.). Springer, Heidelberg, Amalfi, Italy, 147-- 171 . https:\/\/doi.org\/10.1007\/978-3-031-14790-6 https:\/\/ia.cr\/2021\/867. 10.1007\/978-3-031-14790-6 C\u00e9cile Delerabl\u00e9e, L\u00e9na\u00efck Gouriou, and David Pointcheval. 2022. Key-Policy ABE with Delegation of Rights. In The 13th Conference on Security in Communication Networks (SCN '22) (LNCS, Vol. 13409), Clemente Galdi and Stanislaw Jarecki (Eds.). Springer, Heidelberg, Amalfi, Italy, 147--171. https:\/\/doi.org\/10.1007\/978-3-031-14790-6 https:\/\/ia.cr\/2021\/867."},{"key":"e_1_3_2_2_10_1","volume-title":"Tang","author":"Gama Nicolas","year":"2020","unstructured":"Nicolas Gama , Mariya Georgieva , Dimitar Jetchev , Kevin McCarthy , Jakob Odersky , Alexander Petric , and Abson S . Tang . 2020 . Detecting Money Laundering Activities via Secure Multi-PartyComputation for Structural Similarities in Flow Networks. Real World Cryptography . https:\/\/www.youtube.com\/watch?v=4hryY6cMPaM&t=2558s. Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Kevin McCarthy, Jakob Odersky, Alexander Petric, and Abson S. Tang. 2020. Detecting Money Laundering Activities via Secure Multi-PartyComputation for Structural Similarities in Flow Networks. Real World Cryptography. https:\/\/www.youtube.com\/watch?v=4hryY6cMPaM&t=2558s."},{"key":"e_1_3_2_2_13_1","volume-title":"Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. In ASIACRYPT 2012 (LNCS","volume":"366","author":"Okamoto Tatsuaki","year":"2012","unstructured":"Tatsuaki Okamoto and Katsuyuki Takashima . 2012 b. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. In ASIACRYPT 2012 (LNCS , Vol. 7658),, Xiaoyun Wang and Kazue Sako (Eds.). Springer, Heidelberg, 349-- 366 . https:\/\/doi.org\/10.1007\/978-3-642-34961-4_22 10.1007\/978-3-642-34961-4_22 Tatsuaki Okamoto and Katsuyuki Takashima. 2012b. Fully Secure Unbounded Inner-Product and Attribute-Based Encryption. In ASIACRYPT 2012 (LNCS, Vol. 7658),, Xiaoyun Wang and Kazue Sako (Eds.). Springer, Heidelberg, 349--366. https:\/\/doi.org\/10.1007\/978-3-642-34961-4_22"},{"key":"e_1_3_2_2_15_1","volume-title":"Electronics & Mobile Communication Conference, UEMCON 2016","author":"Soltani Reza","year":"2016","unstructured":"Reza Soltani , Uyen Trang Nguyen , Yang Yang , Mohammad Reza Faghani , Alaa Yagoub , and Aijun An . 2016 . A new algorithm for money laundering detection based on structural similarity. In 7th IEEE Annual Ubiquitous Computing , Electronics & Mobile Communication Conference, UEMCON 2016 , New York City, NY, USA, October 20--22 , 2016. IEEE, 1--7. https:\/\/doi.org\/10.1109\/UEMCON.2016.7777919 10.1109\/UEMCON.2016.7777919 Reza Soltani, Uyen Trang Nguyen, Yang Yang, Mohammad Reza Faghani, Alaa Yagoub, and Aijun An. 2016. A new algorithm for money laundering detection based on structural similarity. In 7th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2016, New York City, NY, USA, October 20--22, 2016. IEEE, 1--7. https:\/\/doi.org\/10.1109\/UEMCON.2016.7777919"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_21"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559374","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3559374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3559374"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":12,"alternative-id":["10.1145\/3548606.3559374","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3559374","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}