{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T04:04:26Z","timestamp":1744949066334,"version":"3.40.4"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877803","type":"print"},{"value":"9783031877810","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87781-0_10","type":"book-chapter","created":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T03:30:50Z","timestamp":1744860650000},"page":"88-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Secure Outsourcing Modular Exponentiation Algorithm in\u00a0Single Server Setting"],"prefix":"10.1007","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuanhang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Jindan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,18]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1007\/978-3-319-11203-9_19","volume-title":"Computer Security - ESORICS 2014","author":"Y Wang","year":"2014","unstructured":"Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 326\u2013343. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11203-9_19"},{"issue":"1","key":"10_CR2","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1007\/s00453-020-00750-2","volume":"83","author":"C Chevalier","year":"2020","unstructured":"Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. Algorithmica 83(1), 72\u2013115 (2020). https:\/\/doi.org\/10.1007\/s00453-020-00750-2","journal-title":"Algorithmica"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"K. Y. Zhao, X. A. Wang, J. Liu, Y. Qiao, and Y. Zhou, \u201dSecure Data Set Operation Protocols for Outsourced Cloud Data to Protect User Privacy in Smart City,\u201d Journal of Circuits, Systems and Computers, vol. 0, no. 0, p. 2150267, https:\/\/doi.org\/10.1142\/s0218126621502674.","DOI":"10.1142\/s0218126621502674."},{"key":"10_CR4","doi-asserted-by":"publisher","unstructured":"Zhao, K., Wang, X.A., Yang, B., Tian, Y., Zhang, J.: A privacy preserving homomorphic computing toolkit for predictive computation. Inf. Process. Manage. 59(2), 102880, 2022\/03\/01\/ (2022). https:\/\/doi.org\/10.1016\/j.ipm.2022.102880.","DOI":"10.1016\/j.ipm.2022.102880."},{"key":"10_CR5","first-page":"243","volume":"2007","author":"A Juels","year":"2007","unstructured":"Juels, A., Kaliski, B.S.: Pors: proofs of retrievability for large files. IACR Cryptol. ePrint Arch. 2007, 243 (2007)","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM conference on Computer and communications security, Alexandria, Virginia, USA (2007). https:\/\/doi.org\/10.1145\/1315245.1315318","DOI":"10.1145\/1315245.1315318"},{"key":"10_CR7","unstructured":"P. Paillier, \u201dPublic-key cryptosystems based on composite degree residuosity classes,\u201d presented at the Proceedings of the 17th international conference on Theory and application of cryptographic techniques, Prague, Czech Republic, 1999"},{"issue":"3","key":"10_CR8","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991). https:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Cryptol."},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/BFb0054129","volume-title":"Advances in Cryptology \u2014 EUROCRYPT\u201998","author":"V Boyko","year":"1998","unstructured":"Boyko, V., Peinado, M., Venkatesan, R.: Speeding up discrete log and factoring based schemes via precomputations. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 221\u2013235. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0054129"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","volume-title":"Theory of Cryptography","author":"S Hohenberger","year":"2005","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 264\u2013282. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/978-3-540-30576-7_15"},{"issue":"9","key":"10_CR11","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386\u20132396 (2014). https:\/\/doi.org\/10.1109\/TPDS.2013.180","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10_CR12","doi-asserted-by":"publisher","unstructured":"Ding, Y., Xu, Z., Ye, J., Choo, K.-K.R.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90, 1\u201313 (2017). https:\/\/doi.org\/10.1016\/j.jcss.2016.11.005","DOI":"10.1016\/j.jcss.2016.11.005"},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/s10586-013-0252-0","volume":"16","author":"X Ma","year":"2013","unstructured":"Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4), 787\u2013796 (2013). https:\/\/doi.org\/10.1007\/s10586-013-0252-0","journal-title":"Clust. Comput."},{"key":"10_CR14","doi-asserted-by":"publisher","unstructured":"Zhao, L., Zhang, M., Shen, H., Zhang, Y., Shen, J.: Privacy-preserving outsourcing schemes of modular exponentiations using single untrusted cloud server. KSII Trans. Internet Inf. Syst. 11, 826\u2013845 (2017). https:\/\/doi.org\/10.3837\/tiis.2017.02.011.","DOI":"10.3837\/tiis.2017.02.011."}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87781-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,17]],"date-time":"2025-04-17T03:30:54Z","timestamp":1744860654000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87781-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877803","9783031877810"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87781-0_10","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"18 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}