{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:29:52Z","timestamp":1777390192001,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["#16KIS0A37"],"award-info":[{"award-number":["#16KIS0A37"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3658644.3691405","type":"proceedings-article","created":{"date-parts":[[2024,12,9]],"date-time":"2024-12-09T12:19:20Z","timestamp":1733746760000},"page":"5003-5005","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Poster: Multiparty Private Set Intersection from Multiparty Homomorphic Encryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5686-9459","authenticated-orcid":false,"given":"Christian","family":"Mouchet","sequence":"first","affiliation":[{"name":"Hasso-Plattner-Institute, University of Potsdam, Potsdam, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1275-8367","authenticated-orcid":false,"given":"Sylvain","family":"Chatel","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9074-1993","authenticated-orcid":false,"given":"Lea","family":"N\u00fcrnberger","sequence":"additional","affiliation":[{"name":"NTNU, Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6441-8375","authenticated-orcid":false,"given":"Wouter","family":"Lueks","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Homomorphic Encryption Security Standard","author":"Albrecht M.","year":"2018","unstructured":"M. Albrecht, M. Chase, H. Chen, J. Ding, S. Goldwasser, S. Gorbunov, S. Halevi, J. Hoffstein, K. Laine, K. Lauter, S. Lokam, D. Micciancio, D. Moody, T. Morrison, A. Sahai, and V. Vaikuntanathan, Homomorphic Encryption Security Standard, HomomorphicEncryption.org, Toronto, Canada, Tech. Rep., 2018."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670282"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623139"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363207"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_4"},{"key":"e_1_3_2_1_10_1","first-page":"175","article-title":"Scalable multi-party private set intersection, in Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory","volume":"10174","author":"Hazay C.","year":"2017","unstructured":"C. Hazay and M. Venkitasubramaniam, Scalable multi-party private set intersection, in Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, vol. 10174, 2017, pp. 175--203.","journal-title":"Public-Key Cryptography"},{"key":"e_1_3_2_1_11_1","volume-title":"NDSS 2012","author":"Huang Y.","year":"2012","unstructured":"Y. Huang, D. Evans, and J. Katz, Private set intersection: Are garbled circuits better than custom protocols in 19th Annual Network and Distributed System Security Symposium, NDSS 2012, 2012."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_34"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_1_15_1","first-page":"1257","volume-title":"Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017","author":"Kolesnikov V.","year":"2017","unstructured":"V. Kolesnikov, N. Matania, B. Pinkas, M. Rosulek, and N. Trieu, Practical multiparty private set intersection from symmetric-key techniques, in Proc. of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, 2017, pp. 1257--1272."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670346"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0071"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2007.59"},{"key":"e_1_3_2_1_20_1","volume-title":"Verifiable fully homomorphic encryption, arXiv CoRR","author":"Viand A.","year":"2023","unstructured":"A. Viand, C. Knabenhans, and A. Hithnawi, Verifiable fully homomorphic encryption, arXiv CoRR, vol. abs\/2301.07041, 2023."},{"key":"e_1_3_2_1_21_1","first-page":"1777","volume-title":"IACR Cryptol. ePrint Arch.","author":"Vos J.","year":"2023","unstructured":"J. Vos, M. Conti, and Z. Erkin, Sok: Collusion-resistant multi-party private set intersections in the semi-honest model, IACR Cryptol. ePrint Arch., p. 1777, 2023."}],"event":{"name":"CCS '24: ACM SIGSAC Conference on Computer and Communications Security","location":"Salt Lake City UT USA","acronym":"CCS '24","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691405","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3658644.3691405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T06:08:27Z","timestamp":1755842907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3658644.3691405"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":21,"alternative-id":["10.1145\/3658644.3691405","10.1145\/3658644"],"URL":"https:\/\/doi.org\/10.1145\/3658644.3691405","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}