{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:26Z","timestamp":1750220006827,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":22,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union?s Horizon 2020 research and innovation program","award":["850990 (PSOTI)"],"award-info":[{"award-number":["850990 (PSOTI)"]}]},{"name":"Google India AI\/ML Research Award","award":["2020"],"award-info":[{"award-number":["2020"]}]},{"name":"SERB MATRICS (Theoretical Sciences) Grant","award":["2020"],"award-info":[{"award-number":["2020"]}]},{"name":"Deutsche Forschungsgemeinschaft (DFG)","award":["SFB 1119 CROSSING\/236615297"],"award-info":[{"award-number":["SFB 1119 CROSSING\/236615297"]}]},{"name":"Centre for Networked Intelligence (a Cisco CSR initiative)","award":["2021 - 2022"],"award-info":[{"award-number":["2021 - 2022"]}]},{"name":"DST National Mission on Interdisciplinary Cyber-Physical Systems (NM-CPS)","award":["2020"],"award-info":[{"award-number":["2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563496","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3379-3381","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster MPClan:"],"prefix":"10.1145","author":[{"given":"Nishat","family":"Koti","sequence":"first","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Shravani","family":"Patil","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Arpita","family":"Patra","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, Bangalore, India"}]},{"given":"Ajith","family":"Suresh","sequence":"additional","affiliation":[{"name":"Technical University of Darmstadt, Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In CRYPTO.  Dan Boneh Elette Boyle Henry Corrigan-Gibbs Niv Gilboa and Yuval Ishai. 2019. Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs. In CRYPTO.","DOI":"10.1007\/978-3-030-26954-8_3"},{"key":"e_1_3_2_1_2_1","volume-title":"FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS","author":"Byali Megha","year":"2020","unstructured":"Megha Byali , Harsh Chaudhari , Arpita Patra , and Ajith Suresh . 2020 . FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS (2020). Megha Byali, Harsh Chaudhari, Arpita Patra, and Ajith Suresh. 2020. FLASH: Fast and Robust Framework for Privacy-preserving Machine Learning. PETS (2020)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338466.3358922"},{"key":"e_1_3_2_1_4_1","volume-title":"Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. In NDSS.","author":"Chaudhari Harsh","year":"2020","unstructured":"Harsh Chaudhari , Rahul Rachuri , and Ajith Suresh . 2020 . Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. In NDSS. Harsh Chaudhari, Rahul Rachuri, and Ajith Suresh. 2020. Trident: Efficient 4PC Framework for Privacy Preserving Machine Learning. In NDSS."},{"key":"e_1_3_2_1_5_1","unstructured":"Cryptography and Privacy Engineering Group at TU Darmstadt. 2017. ENCRYPTO Utils. https:\/\/github.com\/encryptogroup\/ENCRYPTO_utils.  Cryptography and Privacy Engineering Group at TU Darmstadt. 2017. ENCRYPTO Utils. https:\/\/github.com\/encryptogroup\/ENCRYPTO_utils."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2007. Scalable and unconditionally secure multiparty computation. In CRYPTO.  Ivan Damg\u00e5rd and Jesper Buus Nielsen. 2007. Scalable and unconditionally secure multiparty computation. In CRYPTO.","DOI":"10.1007\/11818175_30"},{"key":"e_1_3_2_1_7_1","unstructured":"Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In NeurIPS.  Micha\u00ebl Defferrard Xavier Bresson and Pierre Vandergheynst. 2016. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In NeurIPS."},{"key":"e_1_3_2_1_8_1","unstructured":"Daniel Escudero and Anders Dalskov. 2021. Honest Majority MPC with Abort with Minimal Online Communication. In LATINCRYPT.  Daniel Escudero and Anders Dalskov. 2021. Honest Majority MPC with Abort with Minimal Online Communication. In LATINCRYPT."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Daniel Genkin Yuval Ishai Manoj M Prabhakaran Amit Sahai and Eran Tromer. 2014. Circuits resilient to additive attacks with applications to secure computation. In STOC.  Daniel Genkin Yuval Ishai Manoj M Prabhakaran Amit Sahai and Eran Tromer. 2014. Circuits resilient to additive attacks with applications to secure computation. In STOC.","DOI":"10.1145\/2591796.2591861"},{"volume-title":"Communication-efficient unconditional MPC with guaranteed output delivery","author":"Goyal Vipul","key":"e_1_3_2_1_10_1","unstructured":"Vipul Goyal , Yanyi Liu , and Yifan Song . 2019. Communication-efficient unconditional MPC with guaranteed output delivery . In CRYPTO. Springer . Vipul Goyal, Yanyi Liu, and Yifan Song. 2019. Communication-efficient unconditional MPC with guaranteed output delivery. In CRYPTO. Springer."},{"key":"e_1_3_2_1_11_1","unstructured":"Vipul Goyal and Yifan Song. 2020. Malicious Security Comes Free in Honest-Majority MPC. In CRYPTO.  Vipul Goyal and Yifan Song. 2020. Malicious Security Comes Free in Honest-Majority MPC. In CRYPTO."},{"key":"e_1_3_2_1_12_1","volume-title":"SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. In USENIX Security.","author":"Koti Nishat","year":"2021","unstructured":"Nishat Koti , Mahak Pancholi , Arpita Patra , and Ajith Suresh . 2021 . SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. In USENIX Security. Nishat Koti, Mahak Pancholi, Arpita Patra, and Ajith Suresh. 2021. SWIFT: Super-fast and Robust Privacy-Preserving Machine Learning. In USENIX Security."},{"key":"e_1_3_2_1_13_1","unstructured":"Nishat Koti Shravani Patil Arpita Patra and Ajith Suresh. 2022a. MPClan: Protocol Suite for Privacy-Conscious Computations. Cryptology ePrint Archive Paper 2022\/675. https:\/\/eprint.iacr.org\/2022\/675  Nishat Koti Shravani Patil Arpita Patra and Ajith Suresh. 2022a. MPClan: Protocol Suite for Privacy-Conscious Computations. Cryptology ePrint Archive Paper 2022\/675. https:\/\/eprint.iacr.org\/2022\/675"},{"key":"e_1_3_2_1_14_1","volume-title":"Tetrad: Actively Secure 4PC for Secure Training and Inference. NDSS.","author":"Koti Nishat","year":"2022","unstructured":"Nishat Koti , Arpita Patra , Rahul Rachuri , and Ajith Suresh . 2022 b. Tetrad: Actively Secure 4PC for Secure Training and Inference. NDSS. Nishat Koti, Arpita Patra, Rahul Rachuri, and Ajith Suresh. 2022b. Tetrad: Actively Secure 4PC for Secure Training and Inference. NDSS."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.726791"},{"key":"e_1_3_2_1_16_1","unstructured":"Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/.  Yann LeCun and Corinna Cortes. 2010. MNIST handwritten digit database. (2010). http:\/\/yann.lecun.com\/exdb\/mnist\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Payman Mohassel and Peter Rindal. 2018. ABY(3): A Mixed Protocol Framework for Machine Learning. In CCS.  Payman Mohassel and Peter Rindal. 2018. ABY(3): A Mixed Protocol Framework for Machine Learning. In CCS."},{"key":"e_1_3_2_1_18_1","unstructured":"Arpita Patra Thomas Schneider Ajith Suresh and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In USENIX Security.  Arpita Patra Thomas Schneider Ajith Suresh and Hossein Yalame. 2021. ABY2.0: Improved Mixed-Protocol Secure Two-Party Computation. In USENIX Security."},{"key":"e_1_3_2_1_19_1","volume-title":"BLAZE: Blazing Fast Privacy-Preserving Machine Learning. In NDSS.","author":"Patra Arpita","year":"2020","unstructured":"Arpita Patra and Ajith Suresh . 2020 . BLAZE: Blazing Fast Privacy-Preserving Machine Learning. In NDSS. Arpita Patra and Ajith Suresh. 2020. BLAZE: Blazing Fast Privacy-Preserving Machine Learning. In NDSS."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Thomas Schneider and Oleksandr Tkachenko. 2019. EPISODE: efficient privacy-preserving similar sequence queries on outsourced genomic databases. In AsiaCCS.  Thomas Schneider and Oleksandr Tkachenko. 2019. EPISODE: efficient privacy-preserving similar sequence queries on outsourced genomic databases. In AsiaCCS.","DOI":"10.1145\/3321705.3329800"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Liyan Shen Xiaojun Chen Jinqiao Shi Ye Dong and Binxing Fang. 2020. An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. In ESORICS.  Liyan Shen Xiaojun Chen Jinqiao Shi Ye Dong and Binxing Fang. 2020. An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. In ESORICS.","DOI":"10.1007\/978-3-030-58951-6_21"},{"key":"e_1_3_2_1_22_1","unstructured":"Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In ICLR.  Karen Simonyan and Andrew Zisserman. 2015. Very Deep Convolutional Networks for Large-Scale Image Recognition. In ICLR."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563496"}},"subtitle":["Protocol Suite for Privacy-Conscious Computations"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":22,"alternative-id":["10.1145\/3548606.3563496","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563496","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}