{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:19:15Z","timestamp":1740100755253,"version":"3.37.3"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,10]],"date-time":"2022-06-10T00:00:00Z","timestamp":1654819200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,10]]},"DOI":"10.1109\/iwqos54832.2022.9812897","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T19:27:44Z","timestamp":1657049264000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["Nearly Optimal Protocols for Computing Multi-party Private Set Union"],"prefix":"10.1109","author":[{"given":"Xuhui","family":"Gong","sequence":"first","affiliation":[{"name":"Huazhong University of Science and Technology,National Engineering Research Center–Big Data Technology and System Lab,Key Laboratory of Services Computing Technology and System, Key Laboratory of Cluster and Grid Computing, School of Computer Science and Technology,Wuhan,China"}]},{"given":"Qiang-Sheng","family":"Hua","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,National Engineering Research Center–Big Data Technology and System Lab,Key Laboratory of Services Computing Technology and System, Key Laboratory of Cluster and Grid Computing, School of Computer Science and Technology,Wuhan,China"}]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[{"name":"Huazhong University of Science and Technology,National Engineering Research Center–Big Data Technology and System Lab,Key Laboratory of Services Computing Technology and System, Key Laboratory of Cluster and Grid Computing, School of Computer Science and Technology,Wuhan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-59870-3_15"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.21236\/ADA457144"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0301-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_13"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19962-7_24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_34"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_23"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.45"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref10","first-page":"218","article-title":"How to play any mental game, or a completeness theorem for protocols with an honest majority","volume-title":"Proc. STOC","author":"Goldwasser"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609965"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-014-0218-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.03.049"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75248-4_21"},{"key":"ref18","article-title":"Fast private set operations with sepia","author":"Many","year":"2012","journal-title":"ETZ G93"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTCOMP.2018.00021"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2721360"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2515513"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486265"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_19"},{"key":"ref24","first-page":"108","article-title":"Computing private set operations with linear complexities","volume":"2016","author":"Davidson","year":"2016","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref25","article-title":"Foundations of cryptography","volume":"2","author":"Oded","year":"2004","journal-title":"basic applications"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"article-title":"Near-optimal compression of probabilistic counting sketches for networking applications","volume-title":"Proc. DIALM-POMC","author":"Scheuermann","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45472-1_7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2432814"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3812.3818"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45146-4_9"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_4"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS54832.2022.9812897"}],"event":{"name":"2022 IEEE\/ACM 30th International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2022,6,10]]},"location":"Oslo, Norway","end":{"date-parts":[[2022,6,12]]}},"container-title":["2022 IEEE\/ACM 30th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9812862\/9812863\/09812897.pdf?arnumber=9812897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T03:45:38Z","timestamp":1706067938000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9812897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/iwqos54832.2022.9812897","relation":{},"subject":[],"published":{"date-parts":[[2022,6,10]]}}}