{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:21:54Z","timestamp":1743132114555,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030267650"},{"type":"electronic","value":"9783030267667"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-26766-7_11","type":"book-chapter","created":{"date-parts":[[2019,7,29]],"date-time":"2019-07-29T23:18:04Z","timestamp":1564442284000},"page":"109-117","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Research on Full Homomorphic Encryption Algorithm for Integer in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Lijuan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lina","family":"Ge","sequence":"additional","affiliation":[]},{"given":"Yugu","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Zhonghua","family":"He","sequence":"additional","affiliation":[]},{"given":"Zerong","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hangui","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,24]]},"reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-13013-7_25","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"NP Smart","year":"2010","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, Phong Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol. 6056, pp. 420\u2013443. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13013-7_25"},{"issue":"6","key":"11_CR2","first-page":"1","volume":"53","author":"P Mell","year":"2011","unstructured":"Mell, P., Grance, T.: The NIST definition of cloud computing. Commun. ACM 53(6), 1\u20133 (2011)","journal-title":"Commun. ACM"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Annual ACM Symposium on Theory of Computing vol. 9, no. 4, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Namjoshi, J., Gupte, A.: Service oriented architecture for cloud based travel reservation software as a service. In: Proceedings of the 2009 IEEE International Conference on Cloud Computing, Bangalore, India, 21\u201325 September 2009, Los Alamitos, CA, USA, pp. 147\u2013150. IEEE Computer Society (2009)","DOI":"10.1109\/CLOUD.2009.77"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Fellows, M., Koblitz, N.: Combinatorial cryptosystems galore. In Finites: Theory, Applications and Algorithms, Contemporary Mathematics, Las Vegas, vol. 168, pp. 51\u201361 (1993)","DOI":"10.1090\/conm\/168\/01688"},{"key":"11_CR6","unstructured":"Xu, P., Liu, C., Xue, S.: Full homomorphic encryption algorithm based on integer polynomial ring. Comput. Eng. 38(24), 1\u20134 (2012)"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-642-22792-9_28","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"J-S Coron","year":"2011","unstructured":"Coron, J.-S., Mandal, A., Naccache, D., Tibouchi, M.: Fully homomorphic encryption over the integers with shorter public keys. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 487\u2013504. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22792-9_28"},{"key":"11_CR8","first-page":"55","volume":"04","author":"S Ni-gang","year":"2018","unstructured":"Ni-gang, S., Haoran, Z., Weixin, W.: A fully homomorphic encryption scheme for integers with n bits. Comput. Appl. Res. 04, 55\u201368 (2018)","journal-title":"Comput. Appl. Res."},{"key":"11_CR9","unstructured":"Xiong, W., Wei, Y., Wang, H.: An improved scheme of full homomorphic encryption based on integer. Comput. Appl. Res. (03), 67\u201378 (2016)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-26766-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T10:22:19Z","timestamp":1710325339000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-26766-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030267650","9783030267667"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-26766-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanchang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ic-ic.tongji.edu.cn\/2019\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}