{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:48:23Z","timestamp":1742914103054,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030691424"},{"type":"electronic","value":"9783030691431"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-69143-1_32","type":"book-chapter","created":{"date-parts":[[2021,2,14]],"date-time":"2021-02-14T04:03:56Z","timestamp":1613275436000},"page":"415-429","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Sooner Lightweight Cryptosystem: Towards Privacy Preservation of Resource-Constrained Devices"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5926-9520","authenticated-orcid":false,"given":"Abraham Ayegba","family":"Alfa","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9289-0404","authenticated-orcid":false,"given":"John Kolo","family":"Alhassan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2294-5545","authenticated-orcid":false,"given":"Olayemi Mikail","family":"Olaniyi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6055-2198","authenticated-orcid":false,"given":"Morufu","family":"Olalere","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,14]]},"reference":[{"key":"32_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/978-3-030-32475-9_27","volume-title":"Applied Informatics","author":"M Olowu","year":"2019","unstructured":"Olowu, M., Yinka-Banjo, C., Misra, S., Florez, H.: A secured private-cloud computing system. In: Florez, H., Leon, M., Diaz-Nafria, J.M., Belli, S. (eds.) ICAI 2019. CCIS, vol. 1051, pp. 373\u2013384. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32475-9_27"},{"key":"32_CR2","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.procs.2016.03.023","volume":"79","author":"MM Potey","year":"2016","unstructured":"Potey, M.M., Dhote, C.A., Sharma, D.H.: Homomorphic encryption for security of cloud data. Procedia Comput. Sci. 79, 175\u2013181 (2016)","journal-title":"Procedia Comput. Sci."},{"issue":"4","key":"32_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes. ACM Comput. Surv. 51(4), 1\u201335 (2018)","journal-title":"ACM Comput. Surv."},{"key":"32_CR4","doi-asserted-by":"publisher","first-page":"512","DOI":"10.1016\/j.future.2019.02.060","volume":"97","author":"MU Hassan","year":"2019","unstructured":"Hassan, M.U., Rehmani, M.H., Chen, J.: Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions. Future Gener. Comput. Syst. 97, 512\u2013529 (2019)","journal-title":"Future Gener. Comput. Syst."},{"doi-asserted-by":"crossref","unstructured":"Das, A., Patterson, S., Wittie, M. P.: EdgeBench: benchmarking edge computing platforms. In: IEEE\/ACM International Conference on Utility and Cloud Computing Companion, pp. 175\u2013180 (2018)","key":"32_CR5","DOI":"10.1109\/UCC-Companion.2018.00053"},{"key":"32_CR6","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-981-15-3338-9_41","volume-title":"Advances in Computational Intelligence and Informatics","author":"M Olowu","year":"2020","unstructured":"Olowu, M., Yinka-Banjo, C., Misra, S., Oluranti, J., Ahuja, R.: Internet of things: demystifying smart cities and communities. In: Chillarige, R., Distefano, S., Rawat, S.S. (eds.) ICACII 2019. LNNS, vol. 119, pp. 363\u2013371. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-3338-9_41"},{"doi-asserted-by":"crossref","unstructured":"Lee, H., et al.: A stochastic process based routing algorithm for wireless Ad Hoc networks. In: IEEE 2019 International Conference on Computing, Networking and Communications, pp. 1018\u20131023 (2019)","key":"32_CR7","DOI":"10.1109\/ICCNC.2019.8685558"},{"doi-asserted-by":"publisher","unstructured":"Singh, S., Sharma, P.K., Moon, S.Y., Park, J.H.: Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. J. Ambient Intell. Human. Comput. 1-8 (2017). https:\/\/doi.org\/10.1007\/s12652-017-0494-4","key":"32_CR8","DOI":"10.1007\/s12652-017-0494-4"},{"issue":"4","key":"32_CR9","first-page":"170","volume":"2","author":"B Padmavathi","year":"2013","unstructured":"Padmavathi, B., Kumari, S.R.: A survey on performance analysis of DES, AES and RSA algorithm along with LSB substitution. Int. J. Sci Res. 2(4), 170\u2013174 (2013)","journal-title":"Int. J. Sci Res."},{"key":"32_CR10","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-981-13-2324-9_27","volume-title":"International Conference on Innovative Computing and Communications","author":"N Patel","year":"2019","unstructured":"Patel, N., Oza, P., Agrawal, S.: Homomorphic cryptography and its applications in various domains. In: Bhattacharyya, S., Hassanien, A.E., Gupta, D., Khanna, A., Pan, I. (eds.) International Conference on Innovative Computing and Communications. LNNS, vol. 55, pp. 269\u2013278. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-13-2324-9_27"},{"issue":"2","key":"32_CR11","doi-asserted-by":"publisher","first-page":"1676","DOI":"10.1109\/COMST.2018.2886932","volume":"21","author":"MS Ali","year":"2019","unstructured":"Ali, M.S., Vecchio, M., Pincheira, M., Dolui, K., Antonelli, F., Rehmani, M.H., Member, S.: Applications of blockchains in the internet of things: a comprehensive survey. IEEE Commun. Surv. Tutorials 21(2), 1676\u20131717 (2019)","journal-title":"IEEE Commun. Surv. Tutorials"},{"unstructured":"Qui, H.: An efficient data protection architecture based on fragmentation and encryption. PhD Thesis, Paris Institute of Technology (ParisTech), Paris, France (2017)","key":"32_CR12"},{"doi-asserted-by":"crossref","unstructured":"Mekki, N., Hamdi, M., Aguili, T., Kin, T.-H.: A privacy-preserving scheme using chaos theory for wireless body area network. In: 2018 14th International Wireless Communications & Mobile Computing Conference, IEEE, pp. 774\u2013779 (2018)","key":"32_CR13","DOI":"10.1109\/IWCMC.2018.8450293"},{"doi-asserted-by":"crossref","unstructured":"Gill, S.S., et al.: Transformative effects of IoT, Blockchain and artificial intelligence on cloud computing: evolution, vision, trends and open challenges.\u00a0Internet of Things,\u00a08, p. 100118 (2019)","key":"32_CR14","DOI":"10.1016\/j.iot.2019.100118"},{"doi-asserted-by":"crossref","unstructured":"Abayomi-Zannu, T.P., Odun-Ayo, I., Tatama, B.F., Misra, S.: Implementing a mobile voting system utilizing blockchain technology and two-factor authentication in Nigeria. In: 1st International Conference on Computing, Communication, and Cyber-Security, pp. 857\u2013872 (2020)","key":"32_CR15","DOI":"10.1007\/978-981-15-3369-3_63"},{"key":"32_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-981-15-0135-7_50","volume-title":"Emerging Research in Data Engineering Systems and Computer Communications","author":"PV Venkateswara Rao","year":"2020","unstructured":"Venkateswara Rao, P.V., Mohan Krishna Varma, N., Sudhakar, R.: A systematic survey on software-defined networks, routing protocols and security infrastructure for underwater wireless sensor networks (UWSNs). In: Venkata Krishna, P., Obaidat, M.S. (eds.) Emerging Research in Data Engineering Systems and Computer Communications. AISC, vol. 1054, pp. 551\u2013559. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-15-0135-7_50"},{"doi-asserted-by":"publisher","unstructured":"Richards, D., Abdelgawad, A., Yelamarthi, K.: How does encryption influence timing in IoT? In: 2018 IEEE Global Conference on Internet of Things, GCIoT 2018 (2019). https:\/\/doi.org\/10.1109\/GCIoT.2018.8620133","key":"32_CR17","DOI":"10.1109\/GCIoT.2018.8620133"},{"doi-asserted-by":"crossref","unstructured":"Adrian, D., et al.: Imperfect forward secrecy: How diffie-hellman fails in practice. In: The 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 5\u201317 (2015)","key":"32_CR18","DOI":"10.1145\/2810103.2813707"},{"issue":"11","key":"32_CR19","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adelman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169\u2013180 (1978)","journal-title":"Found. Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Ph.D. Dissertation. Stanford University (2009)","key":"32_CR20","DOI":"10.1145\/1536414.1536440"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"M van Dijk","year":"2010","unstructured":"van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol. 6110, pp. 24\u201343. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13190-5_2"},{"doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Fully homomorphic encryption from ring-LWE and security for key dependent messages. In: 31st Annual Cryptology Conference, Advances in Cryptology (CRYPTO 2011), pp. 505\u2013524 (2011)","key":"32_CR22","DOI":"10.1007\/978-3-642-22792-9_29"},{"doi-asserted-by":"crossref","unstructured":"L\u00f3pez-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: The 44th Annual ACM Symposium on Theory of Computing, pp. 1219\u20131234 (2012)","key":"32_CR23","DOI":"10.1145\/2213977.2214086"},{"issue":"2","key":"32_CR24","first-page":"2044","volume":"6","author":"MA Ferrag","year":"2018","unstructured":"Ferrag, M.A., Derdour, M., Mukherjee, M., Derhab, A., Maglaras, L., Janicke, H.: Blockchain technologies for the internet of things: research issues and challenges. IEEE Internet Things J. 6(2), 2044\u20132188 (2018)","journal-title":"IEEE Internet Things J."},{"key":"32_CR25","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"4","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 4, 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"key":"32_CR26","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-319-97749-2_8","volume-title":"Digital Economy. Emerging Technologies and Business Innovation","author":"T Omrani","year":"2018","unstructured":"Omrani, T., Rhouma, R., Sliman, L.: Lightweight cryptography for resource-constrained devices: a comparative study and rectangle cryptanalysis. In: Bach Tobji, M.A., Jallouli, R., Koubaa, Y., Nijholt, A. (eds.) ICDEc 2018. LNBIP, vol. 325, pp. 107\u2013118. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-97749-2_8"},{"issue":"1","key":"32_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11427-019-9817-6","volume":"63","author":"Z Liu","year":"2020","unstructured":"Liu, Z., Han, S., Wang, Q., Li, W., Liu, Y., Gu, D.: New insights on linear cryptanalysis. Sci. Chin. Inf. Sci. 63(1), 1\u201311 (2020)","journal-title":"Sci. Chin. Inf. Sci."}],"container-title":["Communications in Computer and Information Science","Information and Communication Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-69143-1_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T00:13:36Z","timestamp":1619309616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-69143-1_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030691424","9783030691431"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-69143-1_32","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"14 February 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communication Technology and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Minna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nigeria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icta12020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ictafutminna.com.ng\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"166","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"55","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Due to the COVID-19 pandemic the conference was held online.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}