{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:44:50Z","timestamp":1725990290235},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030003043"},{"type":"electronic","value":"9783030003050"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00305-0_25","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T06:55:57Z","timestamp":1536216957000},"page":"357-372","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Performance and Resource Consumption Assessment of Secret Sharing Based Secure Multiparty Computation"],"prefix":"10.1007","author":[{"given":"Marcel","family":"von Maltitz","sequence":"first","affiliation":[]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"unstructured":"A FRamework for Efficient Secure COmputation. \n https:\/\/github.com\/aicis\/fresco","key":"25_CR1"},{"unstructured":"Raspberry Pi Models. \n https:\/\/www.raspberrypi.org\/products\/","key":"25_CR2"},{"doi-asserted-by":"crossref","unstructured":"Beaver, D., Micali, S., Rogaway, P.: The round complexity of secure protocols. In: Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pp. 503\u2013513 (1990)","key":"25_CR3","DOI":"10.1145\/100216.100287"},{"doi-asserted-by":"publisher","unstructured":"Ben-David, A., Nisan, N., Pinkas, B.: FairplayMP: a system for secure multi-party computation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 257\u2013266 (2008). \n https:\/\/doi.org\/10.1145\/1455770.1455804","key":"25_CR4","DOI":"10.1145\/1455770.1455804"},{"doi-asserted-by":"publisher","unstructured":"Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault tolerant distributed computation. In: Proceedings of the 20th Annual ACM Symposium on the Theory of Computing (STOC), pp. 1\u201310 (1988). \n https:\/\/doi.org\/10.1145\/62212.62213","key":"25_CR5","DOI":"10.1145\/62212.62213"},{"key":"25_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1007\/978-3-540-88313-5_13","volume-title":"Computer Security - ESORICS 2008","author":"D Bogdanov","year":"2008","unstructured":"Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Jajodia, S., Lopez, J. (eds.) ESORICS 2008. LNCS, vol. 5283, pp. 192\u2013206. Springer, Heidelberg (2008). \n https:\/\/doi.org\/10.1007\/978-3-540-88313-5_13"},{"issue":"6","key":"25_CR7","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s10207-012-0177-2","volume":"11","author":"D Bogdanov","year":"2012","unstructured":"Bogdanov, D., Niitsoo, M., Toft, T., Willemson, J.: High-performance secure multi-party computation for data mining applications. Int. J. Inf. Secur. 11(6), 403\u2013418 (2012). \n https:\/\/doi.org\/10.1007\/s10207-012-0177-2","journal-title":"Int. J. Inf. Secur."},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-642-32946-3_5","volume-title":"Financial Cryptography and Data Security","author":"D Bogdanov","year":"2012","unstructured":"Bogdanov, D., Talviste, R., Willemson, J.: Deploying secure multi-party computation for financial data analysis. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 57\u201364. Springer, Heidelberg (2012). \n https:\/\/doi.org\/10.1007\/978-3-642-32946-3_5"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-642-03549-4_20","volume-title":"Financial Cryptography and Data Security","author":"P Bogetoft","year":"2009","unstructured":"Bogetoft, P., et al.: Secure multiparty computation goes live. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 325\u2013343. Springer, Heidelberg (2009). \n https:\/\/doi.org\/10.1007\/978-3-642-03549-4_20"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1007\/11889663_10","volume-title":"Financial Cryptography and Data Security","author":"P Bogetoft","year":"2006","unstructured":"Bogetoft, P., Damg\u00e5rd, I., Jakobsen, T., Nielsen, K., Pagter, J., Toft, T.: A practical implementation of secure auctions based on multiparty integer computation. In: Di Crescenzo, G., Rubin, A. (eds.) FC 2006. LNCS, vol. 4107, pp. 142\u2013147. Springer, Heidelberg (2006). \n https:\/\/doi.org\/10.1007\/11889663_10"},{"doi-asserted-by":"crossref","unstructured":"Bonawitz, K., et al.: Practical secure aggregation for privacy preserving machine learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, vol. 2017, pp. 1175\u20131191 (2017)","key":"25_CR11","DOI":"10.1145\/3133956.3133982"},{"unstructured":"Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: Proceedings of the 19th USENIX Conference on Security, p. 15 (2010)","key":"25_CR12"},{"unstructured":"Canetti, R.: Security and Composition of Multi-party Cryptographic Protocols (1999)","key":"25_CR13"},{"unstructured":"Chair of Network Architectures and Services; TUM: MeasrDroid. \n http:\/\/www.droid.net.in.tum.de","key":"25_CR14"},{"doi-asserted-by":"publisher","unstructured":"Chaum, D., Cr\u00e9peau, C., Damg\u00e5rd, I.: Multiparty unconditionally secure protocols. In: Proceedings of the 20th Annual ACM Symposium on Theory of Computing, pp. 11\u201319 (1988). \n https:\/\/doi.org\/10.1007\/3-540-48184-2_43","key":"25_CR15","DOI":"10.1007\/3-540-48184-2_43"},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/3-540-48184-2_7","volume-title":"Advances in Cryptology \u2014 CRYPTO 1987","author":"D Chaum","year":"1988","unstructured":"Chaum, D., Damg\u00e5rd, I.B., van de Graaf, J.: Multiparty computations ensuring privacy of each party\u2019s input and correctness of the result. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 87\u2013119. Springer, Heidelberg (1988). \n https:\/\/doi.org\/10.1007\/3-540-48184-2_7"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/978-3-642-32009-5_38","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"I Damg\u00e5rd","year":"2012","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 643\u2013662. Springer, Heidelberg (2012). \n https:\/\/doi.org\/10.1007\/978-3-642-32009-5_38"},{"unstructured":"Geisler, M.: Cryptographic protocols: theory and implementation. Ph.D. thesis, Aarhus University (2010)","key":"25_CR18"},{"doi-asserted-by":"publisher","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play ANY mental game. In: Proceedings of the Nineteenth Annual ACM Conference on Theory of Computing - STOC 1987, pp. 218\u2013229. ACM, New York (1987). \n https:\/\/doi.org\/10.1145\/28395.28420","key":"25_CR19","DOI":"10.1145\/28395.28420"},{"doi-asserted-by":"publisher","unstructured":"Keller, M., Orsini, E., Scholl, P.: MASCOT. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 830\u2013842 (2016). \n https:\/\/doi.org\/10.1145\/2976749.2978357","key":"25_CR20","DOI":"10.1145\/2976749.2978357"},{"doi-asserted-by":"publisher","unstructured":"Kerschbaum, F., Biswas, D., De Hoogh, S.: Performance comparison of secure comparison protocols. In: Proceedings of International Workshop on Database and Expert Systems Applications, DEXA, October 2009, pp. 133\u2013136 (2009). \n https:\/\/doi.org\/10.1109\/DEXA.2009.37","key":"25_CR21","DOI":"10.1109\/DEXA.2009.37"},{"doi-asserted-by":"publisher","unstructured":"Kerschbaum, F., Dahlmeier, D., Schr\u00f6pfer, A., Biswas, D.: On the practical importance of communication complexity for secure multi-party computation protocols. In: Proceedings of the 2009 ACM Symposium on Applied Computing - SAC 2009, pp. 2008\u20132015 (2009). \n https:\/\/doi.org\/10.1145\/1529282.1529730","key":"25_CR22","DOI":"10.1145\/1529282.1529730"},{"doi-asserted-by":"publisher","unstructured":"von Maltitz, M., Carle, G.: Leveraging secure multiparty computation in the Internet of Things. In: MobiSys 2018: ACM Open IoT Day, p. 3. ACM, New York (2018). \n https:\/\/doi.org\/10.1145\/3210240.3223569","key":"25_CR23","DOI":"10.1145\/3210240.3223569"},{"doi-asserted-by":"crossref","unstructured":"von Maltitz, M., Smarzly, S., Kinkelin, H., Carle, G.: A management framework for secure multiparty computation in dynamic environments. In: NOMS 2018 - IEEE\/IFIP DOMINOS Workshop, Taipei, Taiwan (2018)","key":"25_CR24","DOI":"10.1109\/NOMS.2018.8406322"},{"key":"25_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-10366-7_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"B Pinkas","year":"2009","unstructured":"Pinkas, B., Schneider, T., Smart, N.P., Williams, S.C.: Secure two-party computation is practical. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 250\u2013267. Springer, Heidelberg (2009). \n https:\/\/doi.org\/10.1007\/978-3-642-10366-7_15"},{"doi-asserted-by":"publisher","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the 21st Annual ACM Symposium on Theory of Computing, pp. 73\u201385 (1989). \n https:\/\/doi.org\/10.1145\/73007.73014","key":"25_CR26","DOI":"10.1145\/73007.73014"},{"key":"25_CR27","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secur. Comput. 4, 169\u2013180 (1978)","journal-title":"Found. Secur. Comput."},{"issue":"11","key":"25_CR28","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM (CACM) 22(11), 612\u2013613 (1979). \n https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM (CACM)"},{"doi-asserted-by":"crossref","unstructured":"Thoma, C., Cui, T., Franchetti, F.: Secure multiparty computation based privacy preserving smart metering system. In: 44th North American Power Symposium (NAPS), pp. 1\u20136 (2012)","key":"25_CR29","DOI":"10.1109\/NAPS.2012.6336415"},{"doi-asserted-by":"publisher","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, pp. 1\u20135. IEEE, Washington, DC (1982). \n https:\/\/doi.org\/10.1109\/SFCS.1982.38","key":"25_CR30","DOI":"10.1109\/SFCS.1982.38"},{"doi-asserted-by":"publisher","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pp. 162\u2013167. IEEE Computer Society Press (1986). \n https:\/\/doi.org\/10.1109\/SFCS.1986.25","key":"25_CR31","DOI":"10.1109\/SFCS.1986.25"},{"key":"25_CR32","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jairtraman.2016.02.005","volume":"56","author":"M Zanin","year":"2016","unstructured":"Zanin, M., et al.: Towards a secure trading of aviation CO2 allowance. J. Air Transp. Manag. 56, 3\u201311 (2016). \n https:\/\/doi.org\/10.1016\/j.jairtraman.2016.02.005","journal-title":"J. Air Transp. Manag."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00305-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,3]],"date-time":"2020-03-03T02:45:54Z","timestamp":1583203554000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00305-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030003043","9783030003050"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00305-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}