{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:30:00Z","timestamp":1766449800374,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"HORIZON EUROPE Civil security for society","doi-asserted-by":"publisher","award":["101069535"],"award-info":[{"award-number":["101069535"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KISA037"],"award-info":[{"award-number":["16KISA037"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3670346","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"3038-3052","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Helium: Scalable MPC among Lightweight Participants and under Churn"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5686-9459","authenticated-orcid":false,"given":"Christian","family":"Mouchet","sequence":"first","affiliation":[{"name":"Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1275-8367","authenticated-orcid":false,"given":"Sylvain","family":"Chatel","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-5641-6270","authenticated-orcid":false,"given":"Apostolos","family":"Pyrgelis","sequence":"additional","affiliation":[{"name":"RISE Research Institutes of Sweden, Stockholm, Sweden"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2374-2248","authenticated-orcid":false,"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[{"name":"SPRING Lab, EPFL, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Martin Albrecht Melissa Chase Hao Chen Jintai Ding Shafi Goldwasser Sergey Gorbunov Shai Halevi Jeffrey Hoffstein Kim Laine Kristin Lauter Satya Lokam Daniele Micciancio Dustin Moody Travis Morrison Amit Sahai and Vinod Vaikuntanathan. 2018. Homomorphic Encryption Security Standard. Technical Report. HomomorphicEncryption.org Toronto Canada."},{"volume-title":"3rd Annual FHE.org Conference on Fully Homomorphic Encryption.","author":"Aranha Diego F.","key":"e_1_3_2_1_2_1","unstructured":"Diego F. Aranha, Anamaria Costache, Antonio Guimaraes, and Eduardo Soria Vazquez. 2024. A Practical Framework for Verifiable Computation over Encrypted Data. 3rd Annual FHE.org Conference on Fully Homomorphic Encryption."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338469.3358945"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243801"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78524-8_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_14"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490390"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732516.2732520"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670282"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623139"},{"key":"e_1_3_2_1_13_1","volume-title":"Privacy and Integrity Preserving Computations with CRISP. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Chatel Sylvain","year":"2021","unstructured":"Sylvain Chatel, Apostolos Pyrgelis, Juan Ram\u00f3n Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2021. Privacy and Integrity Preserving Computations with CRISP. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2111--2128."},{"key":"e_1_3_2_1_14_1","volume-title":"Nektarios Georgios Tsoutsos, and Michail Maniatakos","author":"Chielle Eduardo","year":"2018","unstructured":"Eduardo Chielle, Oleg Mazonka, Homer Gamil, Nektarios Georgios Tsoutsos, and Michail Maniatakos. 2018. E3: A framework for compiling C programs with encrypted operands. Cryptology ePrint Archive (2018)."},{"key":"e_1_3_2_1_15_1","volume-title":"CRYPTO 2021, Virtual Event, August 16--20, 2021, Proceedings, Part II 41","author":"Choudhuri Arka Rai","year":"2021","unstructured":"Arka Rai Choudhuri, Aarushi Goel, Matthew Green, Abhishek Jain, and Gabriel Kaptchuk. 2021. Fluid MPC: secure multiparty computation with dynamic participants. In Advances in Cryptology--CRYPTO 2021: 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16--20, 2021, Proceedings, Part II 41. Springer, 94--123."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41527-2_27"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684464.2684470"},{"key":"e_1_3_2_1_18_1","volume-title":"14th Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: Private, robust, and scalable computation of aggregate statistics. In 14th Symposium on Networked Systems Design and Implementation (NSDI 17). 259--282."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243828"},{"key":"e_1_3_2_1_20_1","volume-title":"Information-Theoretic Cryptography Conference (ITC","author":"Damg\u00e5rd Ivan","year":"2023","unstructured":"Ivan Damg\u00e5rd, Daniel Escudero, and Antigoni Polychroniadou. 2023. Phoenix: Secure computation in an unstable network with dropouts and comebacks. Information-Theoretic Cryptography Conference (ITC 2023)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_10"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_23"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_32"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3386023"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23113"},{"key":"e_1_3_2_1_26_1","volume-title":"Scalable and Privacy-Preserving Federated Principal Component Analysis. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 888--905","author":"Froelicher David","year":"2022","unstructured":"David Froelicher, Hyunghoon Cho, Manaswitha Edupalli, Joao Sa Sousa, Jean-Philippe Bossuat, Apostolos Pyrgelis, Juan R Troncoso-Pastoriza, Bonnie Berger, and Jean-Pierre Hubaux. 2022. Scalable and Privacy-Preserving Federated Principal Component Analysis. In 2023 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, 888--905."},{"key":"e_1_3_2_1_27_1","volume-title":"YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. In Annual International Cryptology Conference. Springer, 64--93","author":"Gentry Craig","year":"2021","unstructured":"Craig Gentry, Shai Halevi, Hugo Krawczyk, Bernardo Magri, Jesper Buus Nielsen, Tal Rabin, and Sophia Yakoubov. 2021. YOSO: You Only Speak Once: Secure MPC with Stateless Ephemeral Roles. In Annual International Cryptology Conference. Springer, 64--93."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00028"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_27"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354238"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","unstructured":"Christian Mouchet. 2024. ChristianMct\/helium-artifacts: v1.0.3. https:\/\/doi.org\/10.5281\/zenodo.12088392","DOI":"10.5281\/zenodo.12088392"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-023-09452-8"},{"key":"e_1_3_2_1_37_1","volume-title":"WAHC 2020--8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography.","author":"Mouchet Christian","year":"2020","unstructured":"Christian Mouchet, Jean-Philippe Bossuat, Juan Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2020. Lattigo: A multiparty homomorphic encryption library in Go. In WAHC 2020--8th Workshop on Encrypted Computing & Applied Homomorphic Cryptography."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","unstructured":"Christian Mouchet Giovanni Torrisi Adrian Cuco? Manon Michel and Cl\u00e9mence Altmeyerhenzien. 2024. ChristianMct\/helium: v0.2.1. https:\/\/doi.org\/10.5281\/zenodo.11045946","DOI":"10.5281\/zenodo.11045946"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"e_1_3_2_1_40_1","volume-title":"Prime Match: A Privacy-Preserving Inventory Matching System. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Polychroniadou Antigoni","year":"2023","unstructured":"Antigoni Polychroniadou, Gilad Asharov, Benjamin Diamond, Tucker Balch, Hans Buehler, Richard Hua, Suwen Gu, Greg Gimler, and Manuela Veloso. 2023. Prime Match: A Privacy-Preserving Inventory Matching System. In 32nd USENIX Security Symposium (USENIX Security 23). 6417--6434."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_25"},{"volume-title":"awesome-mpc. https:\/\/github.com\/rdragos\/awesome-mpc. Date accessed","year":"2023","key":"e_1_3_2_1_42_1","unstructured":"Drago? Rotaru. 2017. awesome-mpc. https:\/\/github.com\/rdragos\/awesome-mpc. Date accessed: January 2023."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100487"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0122"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2021.24119"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559613.3563192"},{"key":"e_1_3_2_1_47_1","volume-title":"HECO: Fully Homomorphic Encryption Compiler. In 32nd USENIX Security Symposium (USENIX Security 23)","author":"Viand Alexander","year":"2023","unstructured":"Alexander Viand, Patrick Jattke, Miro Haller, and Anwar Hithnawi. 2023. HECO: Fully Homomorphic Encryption Compiler. In 32nd USENIX Security Symposium (USENIX Security 23). 4715--4732."},{"key":"e_1_3_2_1_48_1","volume-title":"Verifiable fully homomorphic encryption. arXiv preprint arXiv:2301.07041","author":"Viand Alexander","year":"2023","unstructured":"Alexander Viand, Christian Knabenhans, and Anwar Hithnawi. 2023. Verifiable fully homomorphic encryption. arXiv preprint arXiv:2301.07041 (2023)."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Salt Lake City UT USA","acronym":"CCS '24"},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670346","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3670346","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:58:46Z","timestamp":1755842326000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3670346"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":48,"alternative-id":["10.1145\/3658644.3670346","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3670346","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}