{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:46Z","timestamp":1750309186251,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T00:00:00Z","timestamp":1725840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,9]]},"DOI":"10.1145\/3678232.3678246","type":"proceedings-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:35:17Z","timestamp":1725489317000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Language-Based Security for Low-Level MPC"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0402-809X","authenticated-orcid":false,"given":"Christian","family":"Skalka","sequence":"first","affiliation":[{"name":"Computer Science, University of Vermont, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3203-3742","authenticated-orcid":false,"given":"Joseph","family":"Near","sequence":"additional","affiliation":[{"name":"Computer Science, University of Vermont, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44929-9_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF61375.2024.00021"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454074"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133904"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00017"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.22"},{"key":"e_1_3_2_1_7_1","unstructured":"Yaniv Aspis. 2018. A Linear Algebraic Approach to Logic Programming. Ph.\u00a0D. Dissertation. Master thesis at Imperial College London."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371123"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_11"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/3322706.3322734"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637113.2637119"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF57540.2023.00009"},{"key":"e_1_3_2_1_13_1","volume-title":"Stan: A probabilistic programming language. Journal of statistical software 76","author":"Carpenter Bob","year":"2017","unstructured":"Bob Carpenter, Andrew Gelman, Matthew\u00a0D Hoffman, Daniel Lee, Ben Goodrich, Michael Betancourt, Marcus\u00a0A Brubaker, Jiqiang Guo, Peter Li, and Allen Riddell. 2017. Stan: A probabilistic programming language. Journal of statistical software 76 (2017)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1891823.1891830"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_30"},{"key":"e_1_3_2_1_16_1","volume-title":"Nigel Smart, and Sarah Zakarias","author":"Damg\u00e5rd Ivan","year":"2012","unstructured":"Ivan Damg\u00e5rd, Valerio Pastro, Nigel Smart, and Sarah Zakarias. 2012. Multiparty Computation from Somewhat Homomorphic Encryption. In Advances in Cryptology \u2013 CRYPTO 2012, Reihaneh Safavi-Naini and Ran Canetti (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 643\u2013662."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ACM on Programming Languages 4, POPL","author":"Darais David","year":"2019","unstructured":"David Darais, Ian Sweet, Chang Liu, and Michael Hicks. 2019. A language for probabilistically oblivious computation. Proceedings of the ACM on Programming Languages 4, POPL (2019), 1\u201331."},{"key":"e_1_3_2_1_18_1","volume-title":"IJCAI 2007, Proceedings of the 20th international joint conference on artificial intelligence. IJCAI-INT JOINT CONF ARTIF INTELL, 2462\u20132467","author":"De\u00a0Raedt Luc","year":"2007","unstructured":"Luc De\u00a0Raedt, Angelika Kimmig, and Hannu Toivonen. 2007. ProbLog: A probabilistic Prolog and its application in link discovery. In IJCAI 2007, Proceedings of the 20th international joint conference on artificial intelligence. IJCAI-INT JOINT CONF ARTIF INTELL, 2462\u20132467."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1561\/9781680835090"},{"key":"e_1_3_2_1_20_1","volume-title":"SymmeProof: Compact zero-knowledge argument for blockchain confidential transactions","author":"Gao Shang","year":"2022","unstructured":"Shang Gao, Zhe Peng, Feng Tan, Yuanqing Zheng, and Bin Xiao. 2022. SymmeProof: Compact zero-knowledge argument for blockchain confidential transactions. IEEE Transactions on Dependable and Secure Computing (2022)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 2019. How to play any mental game or a completeness theorem for protocols with honest majority. In Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali. 307\u2013328.","DOI":"10.1145\/3335741.3335759"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2018.00016"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428208"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3571740"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1137\/080725398"},{"key":"e_1_3_2_1_26_1","first-page":"4961","article-title":"Crypten: Secure multi-party computation meets machine learning","volume":"34","author":"Knott Brian","year":"2021","unstructured":"Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, and Laurens van\u00a0der Maaten. 2021. Crypten: Secure multi-party computation meets machine learning. Advances in Neural Information Processing Systems 34 (2021), 4961\u20134973.","journal-title":"Advances in Neural Information Processing Systems"},{"volume-title":"IFIP International Summer School on Privacy and Identity Management","author":"Koch Karl","key":"e_1_3_2_1_27_1","unstructured":"Karl Koch, Stephan Krenn, Donato Pellegrino, and Sebastian Ramacher. 2020. Privacy-preserving analytics for data markets using MPC. In IFIP International Summer School on Privacy and Identity Management. Springer, 226\u2013246."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3591226"},{"key":"e_1_3_2_1_29_1","volume-title":"International Conference on Machine Learning. PMLR, 6326\u20136336","author":"Li Xiling","year":"2021","unstructured":"Xiling Li, Rafael Dowsley, and Martine De\u00a0Cock. 2021. Privacy-preserving feature selection with secure multiparty computation. In International Conference on Machine Learning. PMLR, 6326\u20136336."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.02.014"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354238"},{"key":"e_1_3_2_1_33_1","volume-title":"13th USENIX Security Symposium (USENIX Security 04)","author":"Malkhi Dahlia","year":"2004","unstructured":"Dahlia Malkhi, Noam Nisan, Benny Pinkas, and Yaron Sella. 2004. Fairplay\u2014A Secure Two-Party Computation System. In 13th USENIX Security Symposium (USENIX Security 04). USENIX Association, San Diego, CA. https:\/\/www.usenix.org\/conference\/13th-usenix-security-symposium\/fairplay-secure-two-party-computation-system"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2012.30"},{"volume-title":"Arithmetic of Finite Fields, Jean\u00a0Claude Bajard and Alev Topuzo\u011flu (Eds.)","author":"Orsini Emmanuela","key":"e_1_3_2_1_35_1","unstructured":"Emmanuela Orsini. 2021. Efficient, Actively Secure MPC with a Dishonest Majority: A Survey. In Arithmetic of Finite Fields, Jean\u00a0Claude Bajard and Alev Topuzo\u011flu (Eds.). Springer International Publishing, Cham, 42\u201371."},{"key":"e_1_3_2_1_36_1","first-page":"4","article-title":"Figaro: An object-oriented probabilistic programming language","volume":"137","author":"Pfeffer Avi","year":"2009","unstructured":"Avi Pfeffer. 2009. Figaro: An object-oriented probabilistic programming language. Charles River Analytics Technical Report 137, 96 (2009), 4.","journal-title":"Charles River Analytics Technical Report"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.48"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17138-4_5"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454078"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2009-0352"},{"key":"e_1_3_2_1_41_1","volume-title":"Engineering and Management: 10th International Conference, KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017, Proceedings 10","author":"Sakama Chiaki","year":"2017","unstructured":"Chiaki Sakama, Katsumi Inoue, and Taisuke Sato. 2017. Linear algebraic characterization of logic programs. In Knowledge Science, Engineering and Management: 10th International Conference, KSEM 2017, Melbourne, VIC, Australia, August 19-20, 2017, Proceedings 10. Springer, 520\u2013533."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00053-0"},{"key":"e_1_3_2_1_43_1","volume-title":"Preserving privacy in mobile health systems using non-interactive zero-knowledge proof and blockchain","author":"Emerson\u00a0Barros Tomaz Antonio","year":"2020","unstructured":"Antonio Emerson\u00a0Barros Tomaz, Jose\u00a0Claudio Do\u00a0Nascimento, Abdelhakim\u00a0Senhaji Hafid, and Jose\u00a0Neuman De\u00a0Souza. 2020. Preserving privacy in mobile health systems using non-interactive zero-knowledge proof and blockchain. IEEE access 8 (2020), 204441\u2013204458."},{"key":"e_1_3_2_1_44_1","unstructured":"Frank Wood Jan\u00a0Willem Meent and Vikash Mansinghka. 2014. A new approach to probabilistic programming inference. In Artificial intelligence and statistics. PMLR 1024\u20131032."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3498713"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.2001.930133"}],"event":{"name":"PPDP 2024: 26th International Symposium on Principles and Practice of Declarative Programming","acronym":"PPDP 2024","location":"Milano Italy"},"container-title":["Proceedings of the 26th International Symposium on Principles and Practice of Declarative Programming"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678232.3678246","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3678232.3678246","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:54:09Z","timestamp":1750287249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3678232.3678246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,9]]},"references-count":46,"alternative-id":["10.1145\/3678232.3678246","10.1145\/3678232"],"URL":"https:\/\/doi.org\/10.1145\/3678232.3678246","relation":{},"subject":[],"published":{"date-parts":[[2024,9,9]]},"assertion":[{"value":"2024-09-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}