2020-12-09
AUTHORSFabrice Benhamouda , Craig Gentry , Sergey Gorbunov , Shai Halevi , Hugo Krawczyk , Chengyu Lin , Tal Rabin , Leonid Reyzin
ABSTRACTBlockchains are gaining traction and acceptance, not just for cryptocurrencies, but increasingly as an architecture for distributed computing. In this work we seek solutions that allow a public blockchain to act as a trusted long-term repository of secret information: Our goal is to deposit a secret with the blockchain, specify how it is to be used (e.g., the conditions under which it is released), and have the blockchain keep the secret and use it only in the specified manner (e.g., release only it once the conditions are met). This simple functionality enables many powerful applications, including signing statements on behalf of the blockchain, using it as the control plane for a storage system, performing decentralized program-obfuscation-as-a-service, and many more.Using proactive secret sharing techniques, we present a scalable solution for implementing this functionality on a public blockchain, in the presence of a mobile adversary controlling a small minority of the participants. The main challenge is that, on the one hand, scalability requires that we use small committees to represent the entire system, but, on the other hand, a mobile adversary may be able to corrupt the entire committee if it is small. For this reason, existing proactive secret sharing solutions are either non-scalable or insecure in our setting.We approach this challenge via “player replaceability”, which ensures the committee is anonymous until after it performs its actions. Our main technical contribution is a system that allows sharing and re-sharing of secrets among the members of small dynamic committees, without knowing who they are until after they perform their actions and erase their secrets. Our solution handles a fully mobile adversary corrupting roughly 1/4 of the participants at any time, and is scalable in terms of both the number of parties and the number of time intervals. More... »
PAGES260-290
Theory of Cryptography
ISBN
978-3-030-64374-4
978-3-030-64375-1
http://scigraph.springernature.com/pub.10.1007/978-3-030-64375-1_10
DOIhttp://dx.doi.org/10.1007/978-3-030-64375-1_10
DIMENSIONShttps://app.dimensions.ai/details/publication/pub.1133494957
JSON-LD is the canonical representation for SciGraph data.
TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT
[
{
"@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json",
"about": [
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information and Computing Sciences",
"type": "DefinedTerm"
},
{
"id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0806",
"inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/",
"name": "Information Systems",
"type": "DefinedTerm"
}
],
"author": [
{
"affiliation": {
"alternateName": "Algorand Foundation, New York, USA",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Algorand Foundation, New York, USA"
],
"type": "Organization"
},
"familyName": "Benhamouda",
"givenName": "Fabrice",
"id": "sg:person.014225261625.94",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014225261625.94"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Algorand Foundation, New York, USA",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Algorand Foundation, New York, USA"
],
"type": "Organization"
},
"familyName": "Gentry",
"givenName": "Craig",
"id": "sg:person.013505357721.13",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013505357721.13"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Waterloo, Waterloo, Canada",
"id": "http://www.grid.ac/institutes/grid.46078.3d",
"name": [
"University of Waterloo, Waterloo, Canada"
],
"type": "Organization"
},
"familyName": "Gorbunov",
"givenName": "Sergey",
"id": "sg:person.07601645527.14",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07601645527.14"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Algorand Foundation, New York, USA",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Algorand Foundation, New York, USA"
],
"type": "Organization"
},
"familyName": "Halevi",
"givenName": "Shai",
"id": "sg:person.015100320721.93",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015100320721.93"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Algorand Foundation, New York, USA",
"id": "http://www.grid.ac/institutes/None",
"name": [
"Algorand Foundation, New York, USA"
],
"type": "Organization"
},
"familyName": "Krawczyk",
"givenName": "Hugo",
"id": "sg:person.013004021661.30",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Columbia University, New York, USA",
"id": "http://www.grid.ac/institutes/grid.21729.3f",
"name": [
"Columbia University, New York, USA"
],
"type": "Organization"
},
"familyName": "Lin",
"givenName": "Chengyu",
"type": "Person"
},
{
"affiliation": {
"alternateName": "University of Pennsylvania, Philadelphia, USA",
"id": "http://www.grid.ac/institutes/grid.25879.31",
"name": [
"Algorand Foundation, New York, USA",
"University of Pennsylvania, Philadelphia, USA"
],
"type": "Organization"
},
"familyName": "Rabin",
"givenName": "Tal",
"id": "sg:person.015473523512.58",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58"
],
"type": "Person"
},
{
"affiliation": {
"alternateName": "Boston University, Boston, USA",
"id": "http://www.grid.ac/institutes/grid.189504.1",
"name": [
"Algorand Inc., Boston, USA",
"Boston University, Boston, USA"
],
"type": "Organization"
},
"familyName": "Reyzin",
"givenName": "Leonid",
"id": "sg:person.016627532062.10",
"sameAs": [
"https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016627532062.10"
],
"type": "Person"
}
],
"datePublished": "2020-12-09",
"datePublishedReg": "2020-12-09",
"description": "Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but increasingly as an architecture for distributed computing. In this work we seek solutions that allow a public blockchain to act as a trusted long-term repository of secret information: Our goal is to deposit a secret with the blockchain, specify how it is to be used (e.g., the conditions under which it is released), and have the blockchain keep the secret and use it only in the specified manner (e.g., release only it once the conditions are met). This simple functionality enables many powerful applications, including signing statements on behalf of the blockchain, using it as the control plane for a storage system, performing decentralized program-obfuscation-as-a-service, and many more.Using proactive secret sharing techniques, we present a scalable solution for implementing this functionality on a public blockchain, in the presence of a mobile adversary controlling a small minority of the participants. The main challenge is that, on the one hand, scalability requires that we use small committees to represent the entire system, but, on the other hand, a mobile adversary may be able to corrupt the entire committee if it is small. For this reason, existing proactive secret sharing solutions are either non-scalable or insecure in our setting.We approach this challenge via \u201cplayer replaceability\u201d, which ensures the committee is anonymous until after it performs its actions. Our main technical contribution is a system that allows sharing and re-sharing of secrets among the members of small dynamic committees, without knowing who they are until after they perform their actions and erase their secrets. Our solution handles a fully mobile adversary corrupting roughly 1/4 of the participants at any time, and is scalable in terms of both the number of parties and the number of time intervals.",
"editor": [
{
"familyName": "Pass",
"givenName": "Rafael",
"type": "Person"
},
{
"familyName": "Pietrzak",
"givenName": "Krzysztof",
"type": "Person"
}
],
"genre": "chapter",
"id": "sg:pub.10.1007/978-3-030-64375-1_10",
"inLanguage": "en",
"isAccessibleForFree": false,
"isPartOf": {
"isbn": [
"978-3-030-64374-4",
"978-3-030-64375-1"
],
"name": "Theory of Cryptography",
"type": "Book"
},
"keywords": [
"mobile adversary",
"public blockchain",
"secret sharing technique",
"main technical contribution",
"secret information",
"control plane",
"sharing solutions",
"scalable solution",
"blockchain",
"sharing technique",
"technical contribution",
"adversary",
"simple functionality",
"number of parties",
"powerful applications",
"main challenges",
"secrets",
"entire system",
"storage system",
"functionality",
"computing",
"scalability",
"specified manner",
"repository",
"small committee",
"architecture",
"sharing",
"cryptocurrencies",
"system",
"long-term repository",
"challenges",
"solution",
"services",
"information",
"applications",
"replaceability",
"goal",
"technique",
"behalf",
"number",
"hand",
"parties",
"time interval",
"work",
"acceptance",
"manner",
"terms",
"time",
"setting",
"statements",
"action",
"contribution",
"reasons",
"participants",
"plane",
"traction",
"Committee",
"interval",
"members",
"entire committee",
"signing statements",
"small minority",
"presence",
"minority"
],
"name": "Can a Public Blockchain Keep a Secret?",
"pagination": "260-290",
"productId": [
{
"name": "dimensions_id",
"type": "PropertyValue",
"value": [
"pub.1133494957"
]
},
{
"name": "doi",
"type": "PropertyValue",
"value": [
"10.1007/978-3-030-64375-1_10"
]
}
],
"publisher": {
"name": "Springer Nature",
"type": "Organisation"
},
"sameAs": [
"https://doi.org/10.1007/978-3-030-64375-1_10",
"https://app.dimensions.ai/details/publication/pub.1133494957"
],
"sdDataset": "chapters",
"sdDatePublished": "2022-05-20T07:50",
"sdLicense": "https://scigraph.springernature.com/explorer/license/",
"sdPublisher": {
"name": "Springer Nature - SN SciGraph project",
"type": "Organization"
},
"sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/chapter/chapter_8.jsonl",
"type": "Chapter",
"url": "https://doi.org/10.1007/978-3-030-64375-1_10"
}
]
Download the RDF metadata as: json-ld nt turtle xml License info
JSON-LD is a popular format for linked data which is fully compatible with JSON.
curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64375-1_10'
N-Triples is a line-based linked data format ideal for batch operations.
curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64375-1_10'
Turtle is a human-readable linked data format.
curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64375-1_10'
RDF/XML is a standard XML format for linked data.
curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-030-64375-1_10'
This table displays all metadata directly associated to this object as RDF triples.
191 TRIPLES
23 PREDICATES
89 URIs
82 LITERALS
7 BLANK NODES
Subject | Predicate | Object | |
---|---|---|---|
1 | sg:pub.10.1007/978-3-030-64375-1_10 | schema:about | anzsrc-for:08 |
2 | ″ | ″ | anzsrc-for:0806 |
3 | ″ | schema:author | Nec2259781b434d188bf935c759a25d50 |
4 | ″ | schema:datePublished | 2020-12-09 |
5 | ″ | schema:datePublishedReg | 2020-12-09 |
6 | ″ | schema:description | Blockchains are gaining traction and acceptance, not just for cryptocurrencies, but increasingly as an architecture for distributed computing. In this work we seek solutions that allow a public blockchain to act as a trusted long-term repository of secret information: Our goal is to deposit a secret with the blockchain, specify how it is to be used (e.g., the conditions under which it is released), and have the blockchain keep the secret and use it only in the specified manner (e.g., release only it once the conditions are met). This simple functionality enables many powerful applications, including signing statements on behalf of the blockchain, using it as the control plane for a storage system, performing decentralized program-obfuscation-as-a-service, and many more.Using proactive secret sharing techniques, we present a scalable solution for implementing this functionality on a public blockchain, in the presence of a mobile adversary controlling a small minority of the participants. The main challenge is that, on the one hand, scalability requires that we use small committees to represent the entire system, but, on the other hand, a mobile adversary may be able to corrupt the entire committee if it is small. For this reason, existing proactive secret sharing solutions are either non-scalable or insecure in our setting.We approach this challenge via “player replaceability”, which ensures the committee is anonymous until after it performs its actions. Our main technical contribution is a system that allows sharing and re-sharing of secrets among the members of small dynamic committees, without knowing who they are until after they perform their actions and erase their secrets. Our solution handles a fully mobile adversary corrupting roughly 1/4 of the participants at any time, and is scalable in terms of both the number of parties and the number of time intervals. |
7 | ″ | schema:editor | N72688e1b217c49f0b1a388d68b8f5fa8 |
8 | ″ | schema:genre | chapter |
9 | ″ | schema:inLanguage | en |
10 | ″ | schema:isAccessibleForFree | false |
11 | ″ | schema:isPartOf | N1b6168954cf349668da22ef701810970 |
12 | ″ | schema:keywords | Committee |
13 | ″ | ″ | acceptance |
14 | ″ | ″ | action |
15 | ″ | ″ | adversary |
16 | ″ | ″ | applications |
17 | ″ | ″ | architecture |
18 | ″ | ″ | behalf |
19 | ″ | ″ | blockchain |
20 | ″ | ″ | challenges |
21 | ″ | ″ | computing |
22 | ″ | ″ | contribution |
23 | ″ | ″ | control plane |
24 | ″ | ″ | cryptocurrencies |
25 | ″ | ″ | entire committee |
26 | ″ | ″ | entire system |
27 | ″ | ″ | functionality |
28 | ″ | ″ | goal |
29 | ″ | ″ | hand |
30 | ″ | ″ | information |
31 | ″ | ″ | interval |
32 | ″ | ″ | long-term repository |
33 | ″ | ″ | main challenges |
34 | ″ | ″ | main technical contribution |
35 | ″ | ″ | manner |
36 | ″ | ″ | members |
37 | ″ | ″ | minority |
38 | ″ | ″ | mobile adversary |
39 | ″ | ″ | number |
40 | ″ | ″ | number of parties |
41 | ″ | ″ | participants |
42 | ″ | ″ | parties |
43 | ″ | ″ | plane |
44 | ″ | ″ | powerful applications |
45 | ″ | ″ | presence |
46 | ″ | ″ | public blockchain |
47 | ″ | ″ | reasons |
48 | ″ | ″ | replaceability |
49 | ″ | ″ | repository |
50 | ″ | ″ | scalability |
51 | ″ | ″ | scalable solution |
52 | ″ | ″ | secret information |
53 | ″ | ″ | secret sharing technique |
54 | ″ | ″ | secrets |
55 | ″ | ″ | services |
56 | ″ | ″ | setting |
57 | ″ | ″ | sharing |
58 | ″ | ″ | sharing solutions |
59 | ″ | ″ | sharing technique |
60 | ″ | ″ | signing statements |
61 | ″ | ″ | simple functionality |
62 | ″ | ″ | small committee |
63 | ″ | ″ | small minority |
64 | ″ | ″ | solution |
65 | ″ | ″ | specified manner |
66 | ″ | ″ | statements |
67 | ″ | ″ | storage system |
68 | ″ | ″ | system |
69 | ″ | ″ | technical contribution |
70 | ″ | ″ | technique |
71 | ″ | ″ | terms |
72 | ″ | ″ | time |
73 | ″ | ″ | time interval |
74 | ″ | ″ | traction |
75 | ″ | ″ | work |
76 | ″ | schema:name | Can a Public Blockchain Keep a Secret? |
77 | ″ | schema:pagination | 260-290 |
78 | ″ | schema:productId | N1a30cb4cdff7484db8e0a30ce5ce99be |
79 | ″ | ″ | N574d3f13994a4dcf84915da1bda5a08a |
80 | ″ | schema:publisher | N3b14a8277bed4567b842bf36b79de6f8 |
81 | ″ | schema:sameAs | https://app.dimensions.ai/details/publication/pub.1133494957 |
82 | ″ | ″ | https://doi.org/10.1007/978-3-030-64375-1_10 |
83 | ″ | schema:sdDatePublished | 2022-05-20T07:50 |
84 | ″ | schema:sdLicense | https://scigraph.springernature.com/explorer/license/ |
85 | ″ | schema:sdPublisher | N75df2807fba64d35a4524750d996212f |
86 | ″ | schema:url | https://doi.org/10.1007/978-3-030-64375-1_10 |
87 | ″ | sgo:license | sg:explorer/license/ |
88 | ″ | sgo:sdDataset | chapters |
89 | ″ | rdf:type | schema:Chapter |
90 | N15062f1889d04d43b897986e1efa4aac | rdf:first | Na971f066b4974af6b01b30967cb7152f |
91 | ″ | rdf:rest | rdf:nil |
92 | N1a30cb4cdff7484db8e0a30ce5ce99be | schema:name | doi |
93 | ″ | schema:value | 10.1007/978-3-030-64375-1_10 |
94 | ″ | rdf:type | schema:PropertyValue |
95 | N1b6168954cf349668da22ef701810970 | schema:isbn | 978-3-030-64374-4 |
96 | ″ | ″ | 978-3-030-64375-1 |
97 | ″ | schema:name | Theory of Cryptography |
98 | ″ | rdf:type | schema:Book |
99 | N2417a1b8616a4092bc40b2cc0c18a58d | rdf:first | sg:person.015100320721.93 |
100 | ″ | rdf:rest | Nca9ffebc8d974e8f96afc2e326aed53c |
101 | N3b14a8277bed4567b842bf36b79de6f8 | schema:name | Springer Nature |
102 | ″ | rdf:type | schema:Organisation |
103 | N574d3f13994a4dcf84915da1bda5a08a | schema:name | dimensions_id |
104 | ″ | schema:value | pub.1133494957 |
105 | ″ | rdf:type | schema:PropertyValue |
106 | N60f12cbcad424af98085e6106ae47446 | rdf:first | sg:person.07601645527.14 |
107 | ″ | rdf:rest | N2417a1b8616a4092bc40b2cc0c18a58d |
108 | N72688e1b217c49f0b1a388d68b8f5fa8 | rdf:first | N99c05421b7cf4d3fbe7d6f45d443f648 |
109 | ″ | rdf:rest | N15062f1889d04d43b897986e1efa4aac |
110 | N75df2807fba64d35a4524750d996212f | schema:name | Springer Nature - SN SciGraph project |
111 | ″ | rdf:type | schema:Organization |
112 | N7df5ca2e58104d299cc28dfa5d9d0c8b | schema:affiliation | grid-institutes:grid.21729.3f |
113 | ″ | schema:familyName | Lin |
114 | ″ | schema:givenName | Chengyu |
115 | ″ | rdf:type | schema:Person |
116 | N99c05421b7cf4d3fbe7d6f45d443f648 | schema:familyName | Pass |
117 | ″ | schema:givenName | Rafael |
118 | ″ | rdf:type | schema:Person |
119 | Na971f066b4974af6b01b30967cb7152f | schema:familyName | Pietrzak |
120 | ″ | schema:givenName | Krzysztof |
121 | ″ | rdf:type | schema:Person |
122 | Nbb0c1ddee4d644c488a7007215bb13be | rdf:first | N7df5ca2e58104d299cc28dfa5d9d0c8b |
123 | ″ | rdf:rest | Nf13f748bfc694aa5aa55a134e9cebd61 |
124 | Nca9ffebc8d974e8f96afc2e326aed53c | rdf:first | sg:person.013004021661.30 |
125 | ″ | rdf:rest | Nbb0c1ddee4d644c488a7007215bb13be |
126 | Nd15335ebc0f144ba9a173c66c20fbc86 | rdf:first | sg:person.016627532062.10 |
127 | ″ | rdf:rest | rdf:nil |
128 | Nec2259781b434d188bf935c759a25d50 | rdf:first | sg:person.014225261625.94 |
129 | ″ | rdf:rest | Nf1f30340156f469089309c2cab9a5835 |
130 | Nf13f748bfc694aa5aa55a134e9cebd61 | rdf:first | sg:person.015473523512.58 |
131 | ″ | rdf:rest | Nd15335ebc0f144ba9a173c66c20fbc86 |
132 | Nf1f30340156f469089309c2cab9a5835 | rdf:first | sg:person.013505357721.13 |
133 | ″ | rdf:rest | N60f12cbcad424af98085e6106ae47446 |
134 | anzsrc-for:08 | schema:inDefinedTermSet | anzsrc-for: |
135 | ″ | schema:name | Information and Computing Sciences |
136 | ″ | rdf:type | schema:DefinedTerm |
137 | anzsrc-for:0806 | schema:inDefinedTermSet | anzsrc-for: |
138 | ″ | schema:name | Information Systems |
139 | ″ | rdf:type | schema:DefinedTerm |
140 | sg:person.013004021661.30 | schema:affiliation | grid-institutes:None |
141 | ″ | schema:familyName | Krawczyk |
142 | ″ | schema:givenName | Hugo |
143 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013004021661.30 |
144 | ″ | rdf:type | schema:Person |
145 | sg:person.013505357721.13 | schema:affiliation | grid-institutes:None |
146 | ″ | schema:familyName | Gentry |
147 | ″ | schema:givenName | Craig |
148 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013505357721.13 |
149 | ″ | rdf:type | schema:Person |
150 | sg:person.014225261625.94 | schema:affiliation | grid-institutes:None |
151 | ″ | schema:familyName | Benhamouda |
152 | ″ | schema:givenName | Fabrice |
153 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014225261625.94 |
154 | ″ | rdf:type | schema:Person |
155 | sg:person.015100320721.93 | schema:affiliation | grid-institutes:None |
156 | ″ | schema:familyName | Halevi |
157 | ″ | schema:givenName | Shai |
158 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015100320721.93 |
159 | ″ | rdf:type | schema:Person |
160 | sg:person.015473523512.58 | schema:affiliation | grid-institutes:grid.25879.31 |
161 | ″ | schema:familyName | Rabin |
162 | ″ | schema:givenName | Tal |
163 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015473523512.58 |
164 | ″ | rdf:type | schema:Person |
165 | sg:person.016627532062.10 | schema:affiliation | grid-institutes:grid.189504.1 |
166 | ″ | schema:familyName | Reyzin |
167 | ″ | schema:givenName | Leonid |
168 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016627532062.10 |
169 | ″ | rdf:type | schema:Person |
170 | sg:person.07601645527.14 | schema:affiliation | grid-institutes:grid.46078.3d |
171 | ″ | schema:familyName | Gorbunov |
172 | ″ | schema:givenName | Sergey |
173 | ″ | schema:sameAs | https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07601645527.14 |
174 | ″ | rdf:type | schema:Person |
175 | grid-institutes:None | schema:alternateName | Algorand Foundation, New York, USA |
176 | ″ | schema:name | Algorand Foundation, New York, USA |
177 | ″ | rdf:type | schema:Organization |
178 | grid-institutes:grid.189504.1 | schema:alternateName | Boston University, Boston, USA |
179 | ″ | schema:name | Algorand Inc., Boston, USA |
180 | ″ | ″ | Boston University, Boston, USA |
181 | ″ | rdf:type | schema:Organization |
182 | grid-institutes:grid.21729.3f | schema:alternateName | Columbia University, New York, USA |
183 | ″ | schema:name | Columbia University, New York, USA |
184 | ″ | rdf:type | schema:Organization |
185 | grid-institutes:grid.25879.31 | schema:alternateName | University of Pennsylvania, Philadelphia, USA |
186 | ″ | schema:name | Algorand Foundation, New York, USA |
187 | ″ | ″ | University of Pennsylvania, Philadelphia, USA |
188 | ″ | rdf:type | schema:Organization |
189 | grid-institutes:grid.46078.3d | schema:alternateName | University of Waterloo, Waterloo, Canada |
190 | ″ | schema:name | University of Waterloo, Waterloo, Canada |
191 | ″ | rdf:type | schema:Organization |