{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:37:08Z","timestamp":1743154628620,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030029333"},{"type":"electronic","value":"9783030029340"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02934-0_8","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T05:42:53Z","timestamp":1542606173000},"page":"79-90","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Fast Homomorphic Encryption Based on CPU-4GPUs Hybrid System in Cloud"],"prefix":"10.1007","author":[{"given":"Jing","family":"Xia","sequence":"first","affiliation":[]},{"given":"Zhong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Xinfa","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Jianping","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"key":"8_CR1","unstructured":"Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homeomorphisms. In: Foundations of Secure Computation, pp. 169\u2013177 (1978)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. thesis, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomrphic encryption using ideal lattices. In: ACM STOC 2009, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2010","author":"M van Dijk","year":"2010","unstructured":"van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24\u201343. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_2"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Fugkeaw, S., Sato, H.: Privacy-preserving access control model for big data cloud. In: Computer Science and Engineering Conference, pp. 1\u20136. IEEE Press, Changchun (2016)","DOI":"10.1109\/ICSEC.2015.7401416"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Swathi, R., Subha, T.: Enhancing data storage security in cloud using certificateless public auditing. In: 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), Bangkok, Thailand, pp. 348\u2013352 (2017)","DOI":"10.1109\/ICCCT2.2017.7972299"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Jiang, W., Zhao, Z., Laat, C.D.: An autonomous security storage solution for data-intensive cooperative cloud computing. In: 2013 IEEE 9th International Conference on e-Science, pp. 369\u2013372. IEEE Press, Beijing (2013)","DOI":"10.1109\/eScience.2013.31"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Shu, J., Jia, X., Yang, K., et al.: Privacy-preserving task recommendation services for crowdsourcing. In: IEEE Transactions on Services Computing (2018)","DOI":"10.1109\/TSC.2018.2791601"},{"issue":"5","key":"8_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TDSC.2015.2483503","volume":"14","author":"Ji Zhang","year":"2017","unstructured":"Zhang, J., Li, H., Liu, X., et al.: On efficient and robust anonymization for privacy protection on massive streaming categorical information. In: IEEE Transactions on Dependable and Secure Computing, vol. 14, pp. 507\u2013520. IEEE (2017)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1007\/s10586-017-0809-4","volume":"20","author":"N Jayapandian","year":"2017","unstructured":"Jayapandian, N., Rahman, A.M.J.M.Z.: Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption. Clust. Comput. 20, 1561\u20131573 (2017)","journal-title":"Clust. Comput."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Sethi, K., Majumdar, A., Bera, P.: A novel implementation of parallel homomorphic encryption for secure data storage in cloud. In: 2017 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), pp. 1\u20137. IEEE Press, San Francisco (2017)","DOI":"10.1109\/CyberSecPODS.2017.8074851"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1515\/phys-2017-0014","volume":"15","author":"Z Min","year":"2017","unstructured":"Min, Z., Yang, G., Shi, J.: A privacy-preserving parallel and homomorphic encryption scheme. Open Phys. 15, 135\u2013142 (2017). De Gruyter Open","journal-title":"Open Phys."},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1109\/JBHI.2017.2657458","volume":"22","author":"A Khedr","year":"2017","unstructured":"Khedr, A., Gulak, G.: SecureMed: secure medical computation using GPU-accelerated homomorphic encryption scheme. IEEE J. Biomed. Health Inform. 22, 597\u2013606 (2017)","journal-title":"IEEE J. Biomed. Health Inform."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Tian, Y., Al-Rodhaan, M., Song, B., et al.: Somewhat homomorphic cryptography for matrix multiplication using GPU acceleration. In: 2014 International Symposium on Biometrics and Security Technologies (ISBAST), pp. 166\u2013170. IEEE Press, Kuala Lumpur (2015)","DOI":"10.1109\/ISBAST.2014.7013115"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Moayedfard, M., Molahosseini, A.S.: Parallel implementations of somewhat homomorphic encryption based on open-MP and CUDA. In: 2015 International Congress on Technology, Communication and Knowledge (ICTCK), pp. 186\u2013190. IEEE Press, Mashhad (2015)","DOI":"10.1109\/ICTCK.2015.7582668"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Wang, W., Hu, Y., Chen, L., et al.: Accelerating fully homomorphic encryption using GPU. In: 2012 IEEE Conference on High Performance Extreme Computing, pp. 1\u20135. IEEE Press, Waltham (2012)","DOI":"10.1109\/HPEC.2012.6408660"}],"container-title":["Lecture Notes in Computer Science","Web Information Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02934-0_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:40:49Z","timestamp":1710268849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02934-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030029333","9783030029340"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02934-0_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wisa22018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/jisq.nju.edu.cn\/wisa2018\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"103","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}