{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:25:36Z","timestamp":1766579136921,"version":"3.37.3"},"reference-count":39,"publisher":"Public Library of Science (PLoS)","issue":"3","license":[{"start":{"date-parts":[[2015,3,26]],"date-time":"2015-03-26T00:00:00Z","timestamp":1427328000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.plosone.org"],"crossmark-restriction":false},"short-container-title":["PLoS ONE"],"DOI":"10.1371\/journal.pone.0122236","type":"journal-article","created":{"date-parts":[[2015,3,27]],"date-time":"2015-03-27T13:22:27Z","timestamp":1427462547000},"page":"e0122236","update-policy":"https:\/\/doi.org\/10.1371\/journal.pone.corrections_policy","source":"Crossref","is-referenced-by-count":3,"title":["Logsum Using Garbled Circuits"],"prefix":"10.1371","volume":"10","author":[{"given":"Jos\u00e9","family":"Port\u00ealo","sequence":"first","affiliation":[]},{"given":"Bhiksha","family":"Raj","sequence":"additional","affiliation":[]},{"given":"Isabel","family":"Trancoso","sequence":"additional","affiliation":[]}],"member":"340","published-online":{"date-parts":[[2015,3,26]]},"reference":[{"key":"ref1","unstructured":"Gentry C. A Fully Homomorphic Encryption Scheme. Ph.D. Thesis, Stanford University. 2009. Available: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/crypto.stanford.edu\/craig\/craig-thesis.pdf\" xlink:type=\"simple\">http:\/\/crypto.stanford.edu\/craig\/craig-thesis.pdf<\/ext-link>."},{"key":"ref2","first-page":"487","article-title":"Advances in Cryptology\u2014CRYPTO 2011","volume":"6841","author":"J-S Coron","year":"2011"},{"key":"ref3","first-page":"24","article-title":"Advances in Cryptology\u2014EUROCRYPT 2010","volume":"6110","author":"M van Dijk","year":"2010"},{"key":"ref4","doi-asserted-by":"crossref","unstructured":"Yao A. Protocols for Secure Computation (Extended Abstract). FOCS 1982: Proceedings of the IEEE Symposium on Foundations of Computer Science; 1982 Nov 3\u20135; Chicago, IL, USA. 1982. p.160\u2013164. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1109\/SFCS.1982.38\" xlink:type=\"simple\">10.1109\/SFCS.1982.38<\/ext-link>","DOI":"10.1109\/SFCS.1982.38"},{"issue":"1","key":"ref5","doi-asserted-by":"crossref","first-page":"59","DOI":"10.29012\/jpc.v1i1.566","article-title":"Secure Multiparty Computation for Privacy-Preserving Data Mining","volume":"1","author":"Y Lindell","year":"2009","journal-title":"Journal of Privacy and Confidentiality"},{"issue":"4","key":"ref6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A Public Key Cryptosystem and a Signature Scheme based on Discrete Logarithms","volume":"31","author":"T ElGamal","year":"1985","journal-title":"IEEE Trans Inf Theory"},{"key":"ref7","first-page":"223","article-title":"Advances in Cryptology\u2014EUROCRYPT\u201999","volume":"1592","author":"P Paillier","year":"1999"},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"Naor M, Pinkas B. Oblivious Transfer and Polynomial Evaluation. STOC 1999: Proceedings of the ACM Symposium on Theory of Computing. 1999 May 1\u20134; Atlanta, GA, USA. 1999. p. 245\u2013254. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1145\/301250.301312\" xlink:type=\"simple\">10.1145\/301250.301312<\/ext-link>","DOI":"10.1145\/301250.301312"},{"key":"ref9","doi-asserted-by":"crossref","unstructured":"Bellare M, Hoang V, Rogaway P. Foundations of Garbled Circuits. CCS 2012: Proceedings of the ACM Conference on Computer and Communications Security. 2012 Oct 16\u201318; Raleigh, NC, USA. 2012. p. 784\u2013796. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1145\/2382196.2382279\" xlink:type=\"simple\">10.1145\/2382196.2382279<\/ext-link>","DOI":"10.1145\/2382196.2382279"},{"issue":"2","key":"ref10","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/MSP.2012.2230540","article-title":"Private Computing with Garbled Circuits [Applications Corner]","volume":"30","author":"R Lazzeretti","year":"2013","journal-title":"IEEE Signal Process Mag"},{"key":"ref11","doi-asserted-by":"crossref","unstructured":"Kabanets V, Cai JY. Circuit Minimization Problem. STOC 2000: Proceedings of the ACM Symposium on Theory of Computing. 2000 May 21\u201323; Portland, OR, USA. 2000. p. 73\u201379. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1145\/335305.335314\" xlink:type=\"simple\">10.1145\/335305.335314<\/ext-link>","DOI":"10.1145\/335305.335314"},{"issue":"5","key":"ref12","first-page":"593","article-title":"The Map Method for Synthesis of Combinational Logic Circuits","volume":"72","author":"M Karnaugh","year":"1953","journal-title":"Transactions of the American Institute of Electrical Engineers, Part I: Communication and Electronics"},{"issue":"6","key":"ref13","doi-asserted-by":"crossref","first-page":"1445","DOI":"10.1002\/j.1538-7305.1956.tb03836.x","article-title":"Detection of Group Invariance or Total Symmetry of a Boolean Function","volume":"35","author":"E McCluskey","year":"1956","journal-title":"Bell System Technical Journal"},{"key":"ref14","unstructured":"Rudell R. Multiple-Valued Logic Minimization for PLA Synthesis. Memorandum No. UCB\/ERL M86\/65. University of California. 1986. Available: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1986\/ERL-86-65.pdf\" xlink:type=\"simple\">http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/1986\/ERL-86-65.pdf<\/ext-link>."},{"article-title":"Synthesis and Optimization of Digital Circuits","year":"1994","author":"G de Micheli","key":"ref15"},{"key":"ref16","unstructured":"Malkhi, D, Nisan N, Pinkas, B, Sella, Y. Fairplay\u2014A Secure Two-Party Computation System. USENIX 2004: Proceedings of the USENIX Security Symposium. 2004 9\u201313 Aug; San Diego, CA, USA. 2004. p. 287\u2013302."},{"key":"ref17","unstructured":"Huang, Y, Evans, D, Katz, J, Malka, L. Faster Secure Two-Party Computation using Garbled Circuits. USENIX 2011: Proceedings of the USENIX Security Symposium. 2011 8\u201312 Aug; San Francisco, CA, USA. 2011. p. 539\u2013554. Software available: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/mightbeevil.com\/framework\" xlink:type=\"simple\">http:\/\/mightbeevil.com\/framework<\/ext-link>."},{"key":"ref18","unstructured":"Pignata T. Garbled Circuit Designer and Executer from the Visual Information Processing and Protection (VIPP). Software available: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/clem.dii.unisi.it\/~vipp\/index.php\/software\/135-garbledcircuit\" xlink:type=\"simple\">http:\/\/clem.dii.unisi.it\/~vipp\/index.php\/software\/135-garbledcircuit<\/ext-link>."},{"key":"ref19","doi-asserted-by":"crossref","unstructured":"Bellare, M, Hoang, V, Keelveedhi, S, Rogaway, P. Efficient Garbling from a Fixed-Key Blockcipher. SP 2013: Proc IEEE Symp Secur Priv. 2013 May 19\u201322; Berkeley, CA, USA. 2013. p. 478\u2013492. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1109\/SP.2013.39\" xlink:type=\"simple\">10.1109\/SP.2013.39<\/ext-link>. Software available: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/cseweb.ucsd.edu\/groups\/justgarble\/\" xlink:type=\"simple\">http:\/\/cseweb.ucsd.edu\/groups\/justgarble\/<\/ext-link>.","DOI":"10.1109\/SP.2013.39"},{"key":"ref20","doi-asserted-by":"crossref","unstructured":"Barni, M, Guajardo, J, Lazzeretti, R. Privacy Preserving Evaluation of Signal Quality with Application to ECG Analysis. WIFS 2010: Proceedings of the IEEE International Workshop on Information Forensics and Security. 2010 Dec 12\u201315; Seattle, WA, USA. 2010. p. 1\u20136. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1109\/WIFS.2010.5711460\" xlink:type=\"simple\">10.1109\/WIFS.2010.5711460<\/ext-link>","DOI":"10.1109\/WIFS.2010.5711460"},{"key":"ref21","first-page":"5868","article-title":"ICASSP 2011: Proc IEEE Int Conf Acoust Speech and Signal Process","author":"M Pathak","year":"2011"},{"issue":"12","key":"ref22","doi-asserted-by":"crossref","first-page":"1223","DOI":"10.1109\/LSP.2013.2285579","article-title":"Exact Reconstruction Analysis of Log-Sum Minimization for Compressed Sensing","volume":"20","author":"Y Shen","year":"2013","journal-title":"IEEE Signal Process Lett"},{"issue":"3","key":"ref23","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1109\/TNNLS.2012.2235082","article-title":"Low-Rank Structure Learning via Nonconvex Heuristic Recovery","volume":"24","author":"Y Dend","year":"2013","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"ref24","first-page":"993","article-title":"Latent Dirichlet Allocation","volume":"3","author":"DM Blei","year":"2003","journal-title":"J Mach Learn Res"},{"issue":"1","key":"ref25","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/89.365379","article-title":"Robust Text-Independent Speaker Identification using Gaussian Mixture Speaker Models","volume":"3","author":"DA Reynolds","year":"1995","journal-title":"IEEE Transactions on Speech and Audio Processing"},{"key":"ref26","first-page":"97","article-title":"Advances in Cryptology\u2013CRYPTO\u201995","volume":"963","author":"D Beaver","year":"1995"},{"key":"ref27","first-page":"119","article-title":"Advances in Cryptology\u2014EUROCRYPT 2001","volume":"2045","author":"B Aiello","year":"2001"},{"key":"ref28","unstructured":"Naor, M, Pinkas, B. Efficient Oblivious Transfer Protocols. SODA 2001: Proceedings of the Annual Symposium on Discrete Algorithms. 2001 Jan 7\u20139; Washington, DC, USA. 2001. p. 448\u2013457."},{"issue":"177","key":"ref29","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","article-title":"Elliptic Curve Cryptosystems","volume":"48","author":"N Koblitz","year":"1987","journal-title":"Math Comput"},{"key":"ref30","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V, Schneider, T. Improved Garbled Circuit: Free XOR Gates and Applications. ICALP 2008: Proceedings of the International Colloquium on Automata, Languages and Programming. 2008 Jul 6\u201313; Reykjavik, Iceland, <comment>2008<\/comment> p. 486\u2013498. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1007\/978-3-540-70583-3_40\" xlink:type=\"simple\">10.1007\/978-3-540-70583-3_40<\/ext-link>","DOI":"10.1007\/978-3-540-70583-3_40"},{"key":"ref31","doi-asserted-by":"crossref","unstructured":"Kolesnikov, V, Sadeghi A-R, Schneider, T. Improved Garbled Circuit Building Blocks and Applications to Auctions and Computing Minima. CANS 2009: Proceddings of the International Conference on Cryptology and Network Security. 2009 Dec 12\u201314; Kanazawa, Japan. 2009. p. 1\u201320. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1007\/978-3-642-10433-6_1\" xlink:type=\"simple\">10.1007\/978-3-642-10433-6_1<\/ext-link>","DOI":"10.1007\/978-3-642-10433-6_1"},{"key":"ref32","doi-asserted-by":"crossref","unstructured":"Goldwasser, S, Kalai, Y, Popa, R, Vaikuntanathan, V, Zeldovich, N. Reusable Garbled Circuits and Succinct Functional Encryption. STOC 2013: Proceedings of the ACM Symposium on Theory of Computing. 2013 Jun 1\u20134; Palo Alto, CA, USA. 2013. p. 555\u2013564. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1145\/2488608.2488678\" xlink:type=\"simple\">10.1145\/2488608.2488678<\/ext-link>","DOI":"10.1145\/2488608.2488678"},{"key":"ref33","first-page":"457","article-title":"Advances in Cryptology\u2014EUROCRYPT 2005","volume":"3494","author":"A Sahai","year":"2005"},{"key":"ref34","doi-asserted-by":"crossref","unstructured":"Boneh, D, Sahai, A, Waters, B. Functional Encryption: Definitions and Challenges. TCC 2011: Proceedings of the Theory of Cryptography Conference. 2011 Mar 28\u201330; Providence, RI, USA. 2011. p. 253\u2013273. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1007\/978-3-642-19571-6_16\" xlink:type=\"simple\">10.1007\/978-3-642-19571-6_16<\/ext-link>","DOI":"10.1007\/978-3-642-19571-6_16"},{"issue":"6","key":"ref35","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1287\/opre.1050.0254","article-title":"Digital Circuit Optimization via Geometric Programming","volume":"53","author":"S Boyd","year":"2005","journal-title":"Oper Res"},{"key":"ref36","doi-asserted-by":"crossref","unstructured":"J\u00e4rvinen, K, Kolesnikov, V, Sadeghi A-R, Schneider, T. Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs. CHES 2010: Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. 2010 Aug 17\u201320; Santa Barbara, CA, USA. 2010. p. 383\u2013397. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1007\/978-3-642-15031-9_26\" xlink:type=\"simple\">10.1007\/978-3-642-15031-9_26<\/ext-link>","DOI":"10.1007\/978-3-642-15031-9_26"},{"key":"ref37","first-page":"36","article-title":"Advances in Cryptology\u2014CRYPTO 2013","volume":"8043","author":"P Mohassel","year":"2013"},{"key":"ref38","doi-asserted-by":"crossref","unstructured":"Pignata, T, Lazzeretti, R, Barni, M. General Function Evaluation in a STPC Setting Via Piecewise Linear Approximation. WIFS 2012: Proceedings of the IEEE International Workshop on Information Forensics and Security. 2012 Dec 2\u20135; Costa Adeje, Tenerife, Spain. 2012. p. 55\u201360. doi: <ext-link xmlns:xlink=\"http:\/\/www.w3.org\/1999\/xlink\" ext-link-type=\"uri\" xlink:href=\"http:\/\/dx.doi.org\/10.1109\/WIFS.2012.6412625\" xlink:type=\"simple\">10.1109\/WIFS.2012.6412625<\/ext-link>","DOI":"10.1109\/WIFS.2012.6412625"},{"key":"ref39","first-page":"2653","article-title":"ICIP 2012: Proc Int Conf Image Proc","author":"Y Luo","year":"2012"}],"container-title":["PLOS ONE"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/dx.plos.org\/10.1371\/journal.pone.0122236","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T09:43:47Z","timestamp":1566467027000},"score":1,"resource":{"primary":{"URL":"https:\/\/dx.plos.org\/10.1371\/journal.pone.0122236"}},"subtitle":[],"editor":[{"given":"Francesco","family":"Pappalardo","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2015,3,26]]},"references-count":39,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,3,26]]}},"URL":"https:\/\/doi.org\/10.1371\/journal.pone.0122236","relation":{},"ISSN":["1932-6203"],"issn-type":[{"type":"electronic","value":"1932-6203"}],"subject":[],"published":{"date-parts":[[2015,3,26]]}}}