{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:59:25Z","timestamp":1750309165819,"version":"3.41.0"},"reference-count":0,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2023,12,31]],"date-time":"2023-12-31T00:00:00Z","timestamp":1703980800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Queue"],"published-print":{"date-parts":[[2023,12,31]]},"abstract":"<jats:p>Multiparty Computation is based on complex math, and over the past decade, MPC has been harnessed as one of the most powerful tools available for the protection of sensitive data. MPC now serves as the basis for protocols that let a set of parties interact and compute on a pool of private inputs without revealing any of the data contained within those inputs. In the end, only the results are revealed. The implications of this can often prove profound.<\/jats:p>","DOI":"10.1145\/3639448","type":"journal-article","created":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T23:05:35Z","timestamp":1704841535000},"page":"78-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Multiparty Computation: To Secure Privacy, Do the Math"],"prefix":"10.1145","volume":"21","author":[{"given":"Nigel","family":"Smart","sequence":"first","affiliation":[{"name":"Katholieke Universiteit Leuven in Belgium"}]},{"given":"Joshua W.","family":"Baron","sequence":"additional","affiliation":[{"name":"Executive Office of the President"}]},{"given":"Sanjay","family":"Saravanan","sequence":"additional","affiliation":[{"name":"Meta"}]},{"given":"Jordan","family":"Brandt","sequence":"additional","affiliation":[{"name":"CEO of Inpher"}]},{"given":"Atefeh","family":"Mashatan","sequence":"additional","affiliation":[{"name":"Cybersecurity Research Lab at Toronto Metropolitan University"}]}],"member":"320","published-online":{"date-parts":[[2024,1,9]]},"container-title":["Queue"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639448","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3639448","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:37Z","timestamp":1750287217000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3639448"}},"subtitle":["A discussion with Nigel Smart, Joshua W. Baron, Sanjay Saravanan, Jordan Brandt, and Atefeh Mashatan"],"short-title":[],"issued":{"date-parts":[[2023,12,31]]},"references-count":0,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2023,12,31]]}},"alternative-id":["10.1145\/3639448"],"URL":"https:\/\/doi.org\/10.1145\/3639448","relation":{},"ISSN":["1542-7730","1542-7749"],"issn-type":[{"type":"print","value":"1542-7730"},{"type":"electronic","value":"1542-7749"}],"subject":[],"published":{"date-parts":[[2023,12,31]]},"assertion":[{"value":"2024-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}