{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:40:29Z","timestamp":1755823229837,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["850990 PSOTI"],"award-info":[{"award-number":["850990 PSOTI"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3624392","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"3624-3626","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Secure and Differentially Private kth Ranked Element"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3189-8066","authenticated-orcid":false,"given":"Gowri R","family":"Chandran","sequence":"first","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2559-7134","authenticated-orcid":false,"given":"Philipp-Florens","family":"Lehwalder","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7244-9593","authenticated-orcid":false,"given":"Leandro","family":"Rometsch","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8090-1316","authenticated-orcid":false,"given":"Thomas","family":"Schneider","sequence":"additional","affiliation":[{"name":"Technical University Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Gagan Aggarwal Nina Mishra and Benny Pinkas. 2004. Secure Computation of the k th-Ranked Element. In EUROCRYPT.","DOI":"10.1007\/978-3-540-24676-3_3"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Donald Beaver Silvio Micali and Phillip Rogaway. 1990. The Round Complexity of Secure Protocols (Extended Abstract). In STOC.","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Jonas B\u00f6hler and Florian Kerschbaum. 2020. Secure Multi-party Computation of Differentially Private Median. In USENIX Security.","DOI":"10.14722\/ndss.2020.24150"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Gowri R. Chandran Carmit Hazay Robin Hundt and Thomas Schneider. 2022. Comparison-based MPC in Star Topology. In SECRYPT.","DOI":"10.5220\/0011144100003283"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2011. A Firm Foundation for Private Data Analysis. In Commun. ACM.","DOI":"10.4016\/26354.01"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Fabienne Eigner Matteo Maffei Ivan Pryvalov Francesca Pampaloni and Aniket Kate. 2014. Differentially private data aggregation with optimal utility. In ACSAC.","DOI":"10.1145\/2664243.2664263"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 1987. How to Play any Mental Game: A Completeness Theorem for Protocols with Honest Majority. In STOC.","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Adam Groce Peter Rindal and Mike Rosulek. 2019. Cheaper Private Set Intersection via Differentially Private Leakage. In PoPETs.","DOI":"10.2478\/popets-2019-0034"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Xi He Ashwin Machanavajjhala Cheryl J. Flynn and Divesh Srivastava. 2017. Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage. In CCS.","DOI":"10.1145\/3133956.3134030"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Anselme Tueno Florian Kerschbaum Stefan Katzenbeisser Yordan Boev and Mubashir Qureshi. 2020. Secure Computation of the kth-Ranked Element in a Star Network. In FC.","DOI":"10.1007\/978-3-030-51280-4_21"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Copenhagen Denmark","acronym":"CCS '23"},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3624392","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3624392","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:45:57Z","timestamp":1755740757000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3624392"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":10,"alternative-id":["10.1145\/3576915.3624392","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3624392","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}