{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T14:54:52Z","timestamp":1767192892124,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535543"},{"type":"electronic","value":"9783031535550"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_16","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"163-172","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Design of Secure Fair Bidding Scheme Based on Threshold Elliptic Curve ElGamal Cryptography"],"prefix":"10.1007","author":[{"given":"LiPing","family":"Shi","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) Advances in Cryptology \u2014 EUROCRYPT 1999. EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Berlin (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16","DOI":"10.1007\/3-540-48910-X_16"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: The Forty-First Annual ACM Symposium on Theory of Computing, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"16_CR3","unstructured":"Rivest, R.L., Shen, E., Adida, B.: Remote electronic voting with fully homomorphic encryption. In: Financial Cryptography and Data Security, pp. 108\u2013115 (2008)"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Patel, S., Persiano G.Y.: Private stateful information retrieval. In: 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1002\u20131019 (2018)","DOI":"10.1145\/3243734.3243821"},{"issue":"2","key":"16_CR5","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1109\/TC.2011.245","volume":"62","author":"C Wang","year":"2016","unstructured":"Wang, C., Wang, Q., Ren, K., Lou, W.: Privacy-preserving public auditing for data storage security in cloud computing. IEEE Trans. Comput. 62(2), 362\u2013375 (2016)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"16_CR6","first-page":"120","volume":"17","author":"Y Ju","year":"2019","unstructured":"Ju, Y., Li, H., Huang, X.: Homomorphic encryption-based secure outsourcing for deep learning. IEEE Trans. Dependable Secure Comput. 17(1), 120\u2013132 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"3","key":"16_CR7","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/3-540-44598-6_3","volume":"15","author":"Y Lindell","year":"2002","unstructured":"Lindell, Y., Pinkas, B.: Privacy preserving data mining. J. Cryptol. 15(3), 177\u2013206 (2002). https:\/\/doi.org\/10.1007\/3-540-44598-6_3","journal-title":"J. Cryptol."},{"key":"16_CR8","unstructured":"Lindell, Y.: Fast secure multiparty computation for small circuits: Beyond dishonest majority. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1853\u20131871 (2017)"},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Koblitz, N.: Elliptic curve cryptosystems, Math.Comp. 48, 203\u2013209 (1987)","DOI":"10.1090\/S0025-5718-1987-0866109-5"},{"key":"16_CR10","volume-title":"Foundations of Modern Cryptography","author":"B Yang","year":"2022","unstructured":"Yang, B.: Foundations of Modern Cryptography. Tsinghua University Press, Beijing (2022)"},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s12204-014-1520-8","volume":"19","author":"Y Long","year":"2014","unstructured":"Long, Y., Chen, K., Mao, X.: New constructions of dynamic threshold cryptosystem. J. Shanghai Jiaotong Univ. (Science) 19, 431\u2013435 (2014). https:\/\/doi.org\/10.1007\/s12204-014-1520-8","journal-title":"J. Shanghai Jiaotong Univ. (Science)"},{"key":"16_CR12","unstructured":"Bhp, P., Chandravathi, D., Roja, P.P.: Encoding and decoding of a message in the implementation of Elliptic Curve Cryptography using Koblitz\u2019s method. Int. J. Comput. Sci. Eng. 2(5), 1904\u20131907 (2010)"},{"key":"16_CR13","unstructured":"Don, B.J.: Alfred, J.M.: Elliptic curve digital signature algorithm (ECDSA) [Z\/OL]. http:\/\/www.certicom.com\/resources\/download\/ecdsa.ps"},{"issue":"8","key":"16_CR14","doi-asserted-by":"publisher","first-page":"2029","DOI":"10.1109\/TIFS.2019.2892158","volume":"14","author":"M Li","year":"2019","unstructured":"Li, M., Sun, X., Wang, W., Liu, J., Wang, J.: Secure minimum computation using paillier homomorphic encryption. IEEE Trans. Inf. Forensics Secur. 14(8), 2029\u20132042 (2019). https:\/\/doi.org\/10.1109\/TIFS.2019.2892158","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR15","unstructured":"LI, S.-D., Kang, J., Yang, X.-Y., Dou, J.-W., Liu, X.: Secure multiparty characters sorting. Chin. J. Comput. 41(5), 1172-P1181 (2018)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:06:03Z","timestamp":1707800763000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_16","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}