{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:22Z","timestamp":1750309222730,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["419340256"],"award-info":[{"award-number":["419340256"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1646999"],"award-info":[{"award-number":["CCF-1646999"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3634737.3645015","type":"proceedings-article","created":{"date-parts":[[2024,6,28]],"date-time":"2024-06-28T11:51:38Z","timestamp":1719575498000},"page":"306-322","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Privacy-Preserving Approximation of the Kidney Exchange Problem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0813-2097","authenticated-orcid":false,"given":"Malte","family":"Breuer","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2569-1042","authenticated-orcid":false,"given":"Ulrike","family":"Meyer","sequence":"additional","affiliation":[{"name":"RWTH Aachen University, Aachen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2769-3076","authenticated-orcid":false,"given":"Susanne","family":"Wetzel","sequence":"additional","affiliation":[{"name":"Stevens Institute of Technology, Hoboken, New Jersey, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250910.1250954"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1421853112"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","unstructured":"Toshinori Araki Jun Furukawa Yehuda Lindell Ariel Nof and Kazuma Ohara. 2016. High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority. In Computer and Communications Security. ACM. 10.1145\/2976749.2978331","DOI":"10.1145\/2976749.2978331"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","unstructured":"Toshinori Araki Jun Furukawa Kazuma Ohara Benny Pinkas Hanan Rosemarin and Hikaru Tsuchida. 2021. Secure Graph Analysis at Scale. In Computer and Communications Security. ACM. 10.1145\/3460120.3484560","DOI":"10.1145\/3460120.3484560"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1111\/ajt.14566"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2020.3954"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1111\/tri.13923"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12911-022-01994-4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"P\u00e9ter Bir\u00f3 Joris van de Klundert David Manlove William Pettersson Tommy Andersson Lisa Burnapp Pavel Chromy Pablo Delgado Piotr Dworczak Bernadette Haase et al. 2019. Modelling and Optimisation in European Kidney Exchange Programmes. In European Journal of Operational Research. Elsevier. 10.1016\/j.ejor.2019.09.006","DOI":"10.1016\/j.ejor.2019.09.006"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59758-4_31"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_30"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_12"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST55820.2022.9851968"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Malte Breuer Pascal Hein Leonardo Pompe Ben Temme Ulrike Meyer and Susanne Wetzel. 2023. Solving the Kidney Exchange Problem Using Privacy-Preserving Integer Programming (Updated and Extended Version). In arXiv preprint arXiv:2208.11319. https:\/\/arxiv.org\/abs\/2208.11319.","DOI":"10.1109\/PST55820.2022.9851968"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508398.3511509"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411497.3420213"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563209"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2013.05.025"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96881-0_26"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00078"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_25_1","unstructured":"DESMO-J. http:\/\/desmoj.sourceforge.net. Accessed 03-May-2021."},{"key":"e_1_3_2_1_26_1","volume-title":"Optimizing Kidney Exchange with Transplant Chains: Theory and Reality. In International Conference on Autonomous Agents and Multiagent Systems-Volume 2. ACM.","author":"Dickerson John P.","year":"2012","unstructured":"John P. Dickerson, Ariel D Procaccia, and Tuomas Sandholm. 2012. Optimizing Kidney Exchange with Transplant Chains: Theory and Reality. In International Conference on Autonomous Agents and Multiagent Systems-Volume 2. ACM."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2018.3026"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITC.2020.5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0109"},{"key":"e_1_3_2_1_30_1","volume-title":"Orca: FSS-based Secure Training with GPUs. In Cryptology ePrint Archive.","author":"Jawalkar Neha","year":"2023","unstructured":"Neha Jawalkar, Kanav Gupta, Arkaprava Basu, Nishanth Chandran, Divya Gupta, and Rahul Sharma. 2023. Orca: FSS-based Secure Training with GPUs. In Cryptology ePrint Archive."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","unstructured":"Marcel Keller. 2020. MP-SPDZ: A Versatile Framework for Multi-Party Computation. In Computer and Communications Security. ACM. 10.1145\/3372297.3417872","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_27"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364527.2364556"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","unstructured":"Yehuda Lindell and Ariel Nof. 2017. A Framework for Constructing Fast MPC over Arithmetic Circuits with Malicious Adversaries and an Honest-Majority. In Computer and Communications Security. ACM. 10.1145\/3133956.3133999","DOI":"10.1145\/3133956.3133999"},{"key":"e_1_3_2_1_35_1","unstructured":"U. Pape and D. Conradt. 1980. Maximales Matching in Graphen. In Ausgew\u00e4hlte Operations Research Software in FORTRAN."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3389\/ti.2022.10551"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1257\/aer.97.3.828"},{"key":"e_1_3_2_1_38_1","unstructured":"Scandiatransplant. http:\/\/www.scandiatransplant.org\/. Accessed 17-Aug-2023."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623147"},{"key":"e_1_3_2_1_40_1","unstructured":"Transplantationsgesetz \u00a78 (German Transplantation Law). https:\/\/www.gesetzeim-internet.de\/tpg\/TPG.pdf. Accessed 17-Aug-2023."},{"key":"e_1_3_2_1_41_1","unstructured":"United Network for Organ Sharing. The Kidney Transplant Waiting List. https:\/\/transplantliving.org\/kidney\/the-kidney-transplant-waitlist\/. Acc. 17-Aug-2023."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0113"}],"event":{"name":"ASIA CCS '24: 19th ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Singapore Singapore","acronym":"ASIA CCS '24"},"container-title":["Proceedings of the 19th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3645015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:07Z","timestamp":1750290247000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3634737.3645015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":42,"alternative-id":["10.1145\/3634737.3645015","10.1145\/3634737"],"URL":"https:\/\/doi.org\/10.1145\/3634737.3645015","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}