{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:03:44Z","timestamp":1750309424381,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,22]],"date-time":"2023-12-22T00:00:00Z","timestamp":1703203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,22]]},"DOI":"10.1145\/3661638.3661692","type":"proceedings-article","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T22:28:59Z","timestamp":1717280939000},"page":"283-290","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient and Secure Multi-Party Private Set Operation Protocol Suitable for IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-5523-1355","authenticated-orcid":false,"given":"Yichen","family":"Bao","sequence":"first","affiliation":[{"name":"Shanghai Maritime University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0243-9995","authenticated-orcid":false,"given":"Lifei","family":"Wei","sequence":"additional","affiliation":[{"name":"Shanghai Maritime University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8861-5461","authenticated-orcid":false,"given":"Dezhi","family":"Han","sequence":"additional","affiliation":[{"name":"Shanghai Maritime University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6]]},"reference":[{"issue":"1","key":"e_1_3_2_1_1_1","first-page":"239","article-title":"Research and development of intelligent healthy community system based on mobile Internet[J]","volume":"35","author":"Xi LI","year":"2015","unstructured":"YUAN Xi, LI Qiang. Research and development of intelligent healthy community system based on mobile Internet[J]. Journal of Computer Applications, 2015, 35(1): 239-242.","journal-title":"Journal of Computer Applications"},{"issue":"17","key":"e_1_3_2_1_2_1","first-page":"3581","article-title":"Present and Outlook Based on 5G Technology","volume":"36","author":"Yanqin YU","year":"2021","unstructured":"HUANG Yanqin,YU Hao, YIN Junyi, Data Transmission Schemes of Power Internet of Things:Present and Outlook Based on 5G Technology. Transactions of China Electrotechnical Society, 2021, 36(17): 3581-3593.","journal-title":"Transactions of China Electrotechnical Society"},{"issue":"5","key":"e_1_3_2_1_3_1","first-page":"53","article-title":"Analysis of privacy preserving computing in inclusive finance[J]","volume":"48","author":"Xue LI","year":"2022","unstructured":"WANG Xue, LI Wulu, LI Yuan, Analysis of privacy preserving computing in inclusive finance[J]. In-formation and Communications Technology and Policy, 2022, 48(5): 53-59.","journal-title":"In-formation and Communications Technology and Policy"},{"key":"e_1_3_2_1_4_1","volume-title":"Multi-party Private Set Operations with an External Decider[M]\/\/Data and Applications Security and Privacy XXXV","author":"Ramezanian S","year":"2021","unstructured":"Ramezanian S, Meskanen T, Niemi V. Multi-party Private Set Operations with an External Decider[M]\/\/Data and Applications Security and Privacy XXXV. Springer International Publishing,2021: 117\u2013135."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA457144"},{"key":"e_1_3_2_1_6_1","volume-title":"Private and Oblivious Set and Multiset Operations[C]\/\/Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security","author":"Blanton M","year":"2012","unstructured":"Blanton M, Aguiar E. Private and Oblivious Set and Multiset Operations[C]\/\/Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. New York, NY, USA:Association for Computing Machinery,2012: 40\u201341."},{"key":"e_1_3_2_1_7_1","volume-title":"Privacy-Preserving Graph Algorithms in the Semi-honest Model[C]. ROY B. \/\/Advances in Cryptology - ASIACRYPT","author":"Brickell J","year":"2005","unstructured":"Brickell J, Shmatikov V. Privacy-Preserving Graph Algorithms in the Semi-honest Model[C]. ROY B. \/\/Advances in Cryptology - ASIACRYPT 2005. Berlin, Heidelberg:Springer Berlin Heidelberg,2005: 236\u2013252."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_24"},{"key":"e_1_3_2_1_9_1","first-page":"2153","article-title":"Survey on private preserving set intersection technology [J]","volume":"2017","author":"Liyan CHEN","unstructured":"SHEN Liyan, CHEN Xiaojun, SHI Jinqiao, Survey on private preserving set intersection technology [J]. Journal of Computer Research and Develop-ment,2017,54(10): 2153-2169 (in Chinese).","journal-title":"Journal of Computer Research and Develop-ment"},{"issue":"08","key":"e_1_3_2_1_10_1","first-page":"1782","article-title":"A survey of privacy preserving oriented set intersection computation[J].","volume":"59","author":"Lifei LIU","year":"2022","unstructured":"WEI Lifei, LIU Jihai, ZHANG Lei, A survey of privacy preserving oriented set intersection computation[J].Journal of Computer Research and Development, 2022, 59(08): 1782\u20131799(in Chinese).","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Kolesnikov V Kumaresan R Rosulek M Efficient Batched Oblivious PRF with Applications to Private Set Intersection[Z]https:\/\/eprint.iacr.org\/2016\/799. 10.1145\/2976749.2978381.","DOI":"10.1145\/2976749.2978381"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Pinkas B Rosulek M Trieu N PSI from PaXoS: Fast Malicious Private Set Intersection[Z]https:\/\/eprint.iacr.org\/2020\/193.","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3154794"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.032513.120149"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0037"},{"key":"e_1_3_2_1_16_1","volume-title":"CAMENISCH J L. \/\/Advances in Cryptology - EUROCRYPT","author":"Freedman M J","year":"2004","unstructured":"Freedman M J, Nissim K, Pinkas B. Efficient Private Matching and Set Intersection[C]. CACHIN C, CAMENISCH J L. \/\/Advances in Cryptology - EUROCRYPT 2004. Berlin, Heidelberg:Springer Berlin Heidelberg,2004: 1\u201319."},{"key":"e_1_3_2_1_17_1","unstructured":"Cheon J H Jarecki S Seo J H. Multi-Party Privacy-Preserving Set Intersection with Quasi-Linear Complexity[Z] https:\/\/eprint.iacr.org\/2010\/512."},{"issue":"5","key":"e_1_3_2_1_18_1","first-page":"77","article-title":"Survey of federated learning research[J]","volume":"7","author":"Chuanxin ZHOU","year":"2021","unstructured":"Chuanxin ZHOU, Yi SUN, Degang WANG, Survey of federated learning research[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 77-92.","journal-title":"Chinese Journal of Network and Information Security"},{"key":"e_1_3_2_1_19_1","volume-title":"YUNG M. \/\/Applied Cryptography and Network Security.","author":"Frikken K.","year":"2007","unstructured":"Frikken K. Privacy-Preserving Set Union[C]. KATZ J, YUNG M. \/\/Applied Cryptography and Network Security. Berlin, Heidelberg:Springer Berlin Heidel-berg,2007: 237\u2013252."},{"key":"e_1_3_2_1_20_1","unstructured":"Zhang C Chen Y Liu W Linear Private Set Union from Multi-Query Reverse Private Membership Test[Z]https:\/\/eprint.iacr.org\/2022\/358."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Shishido K Miyaji A. Efficient and Quasi-accurate Multiparty Private Set Union[C]\/\/2018 IEEE International Conference on Smart Computing (SMARTCOMP).","DOI":"10.1109\/SMARTCOMP.2018.00021"},{"key":"e_1_3_2_1_22_1","unstructured":"Many D Burkhart M Dimitropoulos X. Fast Private Set Operations with SEPIA[R]\/\/TIK Report. Zurich:ETH Zurich Computer Engineering and Networks Laboratory 2012."},{"key":"e_1_3_2_1_23_1","unstructured":"Chen Y Zhang M Zhang C Private Set Operations from Multi-Query Reverse Private Membership Test[Z]https:\/\/eprint.iacr.org\/2022\/652."},{"key":"e_1_3_2_1_24_1","volume-title":"CHAUM D. \/\/Advances in Cryptology.","author":"ElGamal T.","year":"1985","unstructured":"ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[C]. BLAKLEY G R, CHAUM D. \/\/Advances in Cryptology. Berlin, Heidelberg:Springer Berlin Heidelberg,1985: 10\u201318."},{"key":"e_1_3_2_1_25_1","volume-title":"DODIS Y, KIAYIAS A, MALKIN T. \/\/Public Key Cryptography - PKC","author":"Bernstein D J","year":"2006","unstructured":"Bernstein D J. Curve25519: New Diffie-Hellman Speed Records[C]. YUNG M, DODIS Y, KIAYIAS A, MALKIN T. \/\/Public Key Cryptography - PKC 2006. Berlin, Heidelberg:Springer Berlin Heidelberg,2006: 207\u2013228."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98113-0_13"},{"key":"e_1_3_2_1_27_1","volume-title":"2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Kolesnikov V","year":"2017","unstructured":"Kolesnikov V, Matania N, Pinkas B, Practical Multi-Party Private Set Intersection from Symmetric-Key Techniques[C]\/\/Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. New York, NY, USA:Association for Computing Machinery,2017: 1257\u20131272."},{"key":"e_1_3_2_1_28_1","volume-title":"YUNG M. \/\/Applied Cryptography and Network Security.","author":"Li R","year":"2007","unstructured":"Li R, Wu C. An Unconditionally Secure Protocol for Multi-Party Set Intersection[C]. KATZ J, YUNG M. \/\/Applied Cryptography and Network Security. Berlin, Heidelberg:Springer Berlin Heidelberg,2007: 226\u2013236."},{"key":"e_1_3_2_1_29_1","volume-title":"Constant-Round Multi-party Private Set Union Using Reversed Laurent Series[C]\/\/Public Key Cryptography - PKC","author":"Seo J H","year":"2012","unstructured":"Seo J H, Cheon J H, Katz J. Constant-Round Multi-party Private Set Union Using Reversed Laurent Series[C]\/\/Public Key Cryptography - PKC 2012. Springer,2012: 398\u2013412."},{"volume-title":"18th International Conference on Security and Cryptography - SECRYPT. SciTePress,2021: 515\u2013522","author":"Bay A","key":"e_1_3_2_1_30_1","unstructured":"Bay A, Erkin Z, Alishahi M, Multi-Party Private Set Intersection Protocols for Practical Applications[C]\/\/Proceedings of the 18th International Conference on Security and Cryptography - SECRYPT. SciTePress,2021: 515\u2013522."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Blanton M Aguiar E. Private and Oblivious Set and Multiset Operations[Z]https:\/\/eprint.iacr.org\/2011\/464.","DOI":"10.1145\/2414456.2414479"},{"key":"e_1_3_2_1_32_1","first-page":"145","volume-title":"Universally Composable Security: A New Paradigm for Cryptographic Protocols","author":"Canetti R.","year":"2001","unstructured":"Canetti R. Universally Composable Security: A New Paradigm for Cryptographic Protocols; Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science; Newport Beach, CA, USA. 8\u201311 October 2001; Washington, DC, USA: IEEE Computer Society Press; 2001. pp. 136\u2013145."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_34_1","volume-title":"DAMG\u00c5RD I, GOLDBERG L A, HALLD\u00d3RSSON M M, ING\u00d3LFSD\u00d3TTIR A, WALUKIEWICZ I. \/\/Automata, Languages and Programming.","author":"Pietrzak K","year":"2008","unstructured":"Pietrzak K, Sj\u00f6din J. Weak Pseudorandom Functions in Minicrypt[C]. ACETO L, DAMG\u00c5RD I, GOLDBERG L A, HALLD\u00d3RSSON M M, ING\u00d3LFSD\u00d3TTIR A, WALUKIEWICZ I. \/\/Automata, Languages and Programming. Berlin, Heidelberg:Springer Berlin Heidelberg,2008: 423\u2013436."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Kavousi A Mohajeri J Salmasizadeh M. Efficient Scalable Multi-Party Private Set Intersection Using Oblivious PRF[Z]https:\/\/eprint.iacr.org\/2021\/484.","DOI":"10.1007\/978-3-030-91859-0_5"},{"key":"e_1_3_2_1_36_1","first-page":"15","article-title":"Secure and efficient multiparty private set intersection cardinality[J]","author":"Debnath S","year":"2019","unstructured":"Debnath S, St\u0103nic\u0103 P, Kundu N, Secure and efficient multiparty private set intersection cardinality[J]. Advances in Mathematics of Communications, 2019, 15.","journal-title":"Advances in Mathematics of Communications"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484591"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2021.3118879"}],"event":{"name":"AISNS 2023: 2023 International Conference on Artificial Intelligence, Systems and Network Security","acronym":"AISNS 2023","location":"Mianyang China"},"container-title":["Proceedings of the 2023 International Conference on Artificial Intelligence, Systems and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3661638.3661692","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3661638.3661692","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:32Z","timestamp":1750294712000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3661638.3661692"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,22]]},"references-count":38,"alternative-id":["10.1145\/3661638.3661692","10.1145\/3661638"],"URL":"https:\/\/doi.org\/10.1145\/3661638.3661692","relation":{},"subject":[],"published":{"date-parts":[[2023,12,22]]},"assertion":[{"value":"2024-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}