{"id":"https://openalex.org/W2782836056","doi":"https://doi.org/10.1109/cdc.2017.8264378","title":"Enforcing opacity by publicly known edit functions","display_name":"Enforcing opacity by publicly known edit functions","publication_year":2017,"publication_date":"2017-12-01","ids":{"openalex":"https://openalex.org/W2782836056","doi":"https://doi.org/10.1109/cdc.2017.8264378","mag":"2782836056"},"language":"en","primary_location":{"id":"doi:10.1109/cdc.2017.8264378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2017.8264378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 56th Annual Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084543188","display_name":"Yiding Ji","orcid":"https://orcid.org/0000-0003-2678-7051"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yiding Ji","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Michigan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Michigan","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027585653","display_name":"St\u00e9phane Lafortune","orcid":"https://orcid.org/0000-0002-7526-6642"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stephane Lafortune","raw_affiliation_strings":["Department of Electrical Engineering and Computer Science, University of Michigan"],"affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering and Computer Science, University of Michigan","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5084543188"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":1.9502,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.8985867,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":93,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"4866","last_page":"4871"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10142","display_name":"Formal Methods in Verification","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/edit-distance","display_name":"Edit distance","score":0.824193000793457},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7738790512084961},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5827639698982239},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.5246049165725708},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3775648772716522},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3722693920135498},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.06617724895477295}],"concepts":[{"id":"https://openalex.org/C44359876","wikidata":"https://www.wikidata.org/wiki/Q5338467","display_name":"Edit distance","level":2,"score":0.824193000793457},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7738790512084961},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5827639698982239},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.5246049165725708},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3775648772716522},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3722693920135498},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.06617724895477295},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/cdc.2017.8264378","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cdc.2017.8264378","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE 56th Annual Conference on Decision and Control (CDC)","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-119401","is_oa":false,"landing_page_url":"http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2018&rft.spage=4866&rft.aulast=Ji&rft.aufirst=&rft.atitle=Enforcing+opacity+by+publicly+known+edit+functions&rft.title=2017+IEEE+56th+Annual+Conference+on+Decision+and+Control%2C+CDC+2017","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1587663028","https://openalex.org/W1976202267","https://openalex.org/W1985508025","https://openalex.org/W1992424076","https://openalex.org/W2001653139","https://openalex.org/W2008737885","https://openalex.org/W2031373068","https://openalex.org/W2037457229","https://openalex.org/W2040603575","https://openalex.org/W2052227055","https://openalex.org/W2064886960","https://openalex.org/W2077280257","https://openalex.org/W2093645787","https://openalex.org/W2162000948","https://openalex.org/W2290520774","https://openalex.org/W2292623133","https://openalex.org/W2416559203","https://openalex.org/W2469385076","https://openalex.org/W2497816991","https://openalex.org/W2509841691","https://openalex.org/W2538443008","https://openalex.org/W2601738991","https://openalex.org/W3037660916"],"related_works":["https://openalex.org/W3044917232","https://openalex.org/W1498160656","https://openalex.org/W2055693471","https://openalex.org/W2119149496","https://openalex.org/W2139858675","https://openalex.org/W2952580779","https://openalex.org/W1537327044","https://openalex.org/W4295101776","https://openalex.org/W4241588278","https://openalex.org/W2807937018"],"abstract_inverted_index":{"This":[0],"paper":[1],"extends":[2],"prior":[3],"work":[4,104],"about":[5],"the":[6,26,36,39,43,54,57,60,65,76,96,108,118,122,145],"enforcement":[7,97,109],"of":[8,38,59,78],"opacity":[9],"by":[10],"insertion":[11],"functions":[12,132],"and":[13,41,87,107,121],"applies":[14],"a":[15,49,114],"more":[16],"general":[17],"method":[18],"called":[19],"edit":[20,27,61,66,79,83,93,100,119,131,135],"functions.":[21],"Based":[22],"on":[23,144],"its":[24],"observations,":[25],"function":[28,67,101,120],"can":[29],"insert":[30],"or":[31],"erase":[32],"events":[33],"to":[34,68,74,127],"modify":[35],"outputs":[37],"system":[40],"obfuscate":[42],"outside":[44],"intruder.":[45],"In":[46,72],"this":[47,103],"paper,":[48],"key":[50],"assumption":[51],"is":[52,105,111,126,141],"that":[53],"intruder":[55],"knows":[56],"implementation":[58],"function,":[62],"which":[63],"requires":[64],"be":[69],"\u201cpublic-private":[70],"enforcing\u201d.":[71],"order":[73],"capture":[75],"limitations":[77],"functions,":[80],"state":[81],"based":[82,143],"constraints":[84],"are":[85],"introduced":[86],"may":[88],"preclude":[89],"some":[90],"originally":[91],"feasible":[92],"choices,":[94],"complicating":[95],"problem.":[98],"The":[99],"in":[102],"deterministic":[106],"problem":[110],"formulated":[112],"as":[113],"two-player":[115],"game":[116,146],"between":[117],"system.":[123],"Our":[124],"goal":[125],"synthesize":[128],"public-private":[129],"enforcing":[130],"without":[133],"violating":[134],"constraints.":[136],"A":[137],"new":[138],"synthesis":[139],"algorithm":[140],"proposed":[142],"structure.":[147]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
