{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:06:38Z","timestamp":1743073598577,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319744995"},{"type":"electronic","value":"9783319745008"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-74500-8_41","type":"book-chapter","created":{"date-parts":[[2018,3,20]],"date-time":"2018-03-20T00:20:32Z","timestamp":1521505232000},"page":"445-452","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["MultiPrime Cloud-RSA Scheme to Promote Data Confidentiality in the Cloud Environment"],"prefix":"10.1007","author":[{"given":"Khalid","family":"El Makkaoui","sequence":"first","affiliation":[]},{"given":"Abderrahim","family":"Beni-Hssane","sequence":"additional","affiliation":[]},{"given":"Abdellah","family":"Ezzati","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,21]]},"reference":[{"key":"41_CR1","doi-asserted-by":"crossref","unstructured":"El Makkaoui, K., Ezzati, A., Beni-Hssane, A., Motamed, C.: Cloud security and privacy model for providing secure cloud services. In: 2016 2nd International Conference on Cloud Computing Technologies and Applications (CloudTech), pp. 81\u201386. IEEE (2016)","DOI":"10.1109\/CloudTech.2016.7847682"},{"issue":"1","key":"41_CR2","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s12652-014-0254-7","volume":"6","author":"C Xiang","year":"2015","unstructured":"Xiang, C., Tang, C.: Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J. Ambient Intell. Humaniz. Comput. 6(1), 131\u2013139 (2015)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Bennasar, H., Bendahmane, A., Essaaidi, M.: An overview of the state-of-the-art of cloud computing cyber-security. In: International Conference on Codes, Cryptology, and Information Security, pp. 56\u201367. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-55589-8_4"},{"issue":"5","key":"41_CR4","doi-asserted-by":"crossref","first-page":"731","DOI":"10.1007\/s12652-016-0385-0","volume":"7","author":"MS Kiraz","year":"2016","unstructured":"Kiraz, M.S.: A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing. J. Ambient Intell. Humaniz. Comput. 7(5), 731\u2013760 (2016)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"41_CR5","first-page":"1","volume":"8","author":"M Alam","year":"2017","unstructured":"Alam, M., Emmanuel, N., Khan, T., Xiang, Y., Hassan, H.: Garbled role-based access control in the cloud. J. Ambient Intell. Humaniz. Comput. 8, 1\u201314 (2017)","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"41_CR6","first-page":"169","volume":"4","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Adleman, L., Dertouzos, M.: On data banks and privacy homomorphisms. Found. Secur. Comput. 4, 169\u2013180 (1978)","journal-title":"Found. Secur. Comput."},{"issue":"2","key":"41_CR7","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R Rivest","year":"1978","unstructured":"Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"41_CR8","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theor. 31, 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"El Makkaoui, K., Beni-Hssane, A., Ezzati, A.: Cloud-ElGamal: an efficient homomorphic encryption scheme. In: 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM), pp. 63\u201366. IEEE (2016)","DOI":"10.1109\/WINCOM.2016.7777192"},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: EUROCRYPT 1999, pp. 223\u2013238 (1999)","DOI":"10.1007\/3-540-48910-X_16"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"El Makkaoui, K., Ezzati, A., Beni-Hssane, A.: Securely adapt a Paillier encryption scheme to protect the data confidentiality in the cloud environment. In: Proceedings of the International Conference on Big Data and Advanced Wireless Technologies. ACM (2016)","DOI":"10.1145\/3010089.3016026"},{"key":"41_CR12","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Doctoral Thesis. University of Stanford (2009). http:\/\/crypto.stanford.edu\/craig"},{"key":"41_CR13","doi-asserted-by":"crossref","unstructured":"Chillotti, I., Gama, N., Georgieva, M., Izabach\u00e8ne, M.: Faster fully homomorphic encryption: bootstrapping in less than 0.1 seconds. In: ASIACRYPT 2016, vol. 10031, pp. 3\u201333 (2016)","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"El Makkaoui, K., Ezzati, A, Beni-Hssane, A.: Cloud-RSA: an enhanced homomorphic encryption scheme. In: Europe and MENA Cooperation Advances in Information and Communication Technologies, pp. 471\u2013480. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-46568-5_48"},{"issue":"4","key":"41_CR15","first-page":"159","volume":"14","author":"A El-Yahyaoui","year":"2016","unstructured":"El-Yahyaoui, A., Elkettani, M.D.: Fully homomorphic encryption: state of art and comparison. Int. J. Comput. Sci. Inf. Secur. 14(4), 159\u2013167 (2016)","journal-title":"Int. J. Comput. Sci. Inf. Secur."},{"key":"41_CR16","unstructured":"Collins, T., Hopkins, D., Langford, S., Sabin, M.: Public Key Cryptographic Apparatus and Method. US Patent #5,848,159 (1997)"},{"key":"41_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/b19324","volume-title":"Mathematical Foundations of Public Key Cryptography","author":"X Wang","year":"2015","unstructured":"Wang, X., Xu, G., Wang, M., Meng, X.: Mathematical Foundations of Public Key Cryptography. CRC Press, Boca Raton (2015)"},{"key":"41_CR18","doi-asserted-by":"crossref","DOI":"10.1533\/9780857092243","volume-title":"Fundamentals of University Mathematics","author":"C McGregor","year":"2010","unstructured":"McGregor, C., Nimmo, J., Stothers, W.: Fundamentals of University Mathematics. Elsevier, Amsterdam (2010)"},{"key":"41_CR19","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139165464","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2005","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2005)"},{"key":"41_CR20","first-page":"11","volume-title":"The Development of the Number Field Sieve","year":"1993","unstructured":"Lenstra, A.K., Lenstra, H.W. (eds.): The Development of the Number Field Sieve, pp. 11\u201342. Springer, Heidelberg (1993)"},{"key":"41_CR21","doi-asserted-by":"crossref","first-page":"649","DOI":"10.2307\/1971363","volume":"126","author":"HW Lenstra Jr","year":"1987","unstructured":"Lenstra Jr., H.W.: Factoring integers with elliptic curves. Annal. Math. 126, 649\u2013673 (1987)","journal-title":"Annal. Math."},{"key":"41_CR22","unstructured":"ANSI Standard X9.31-1998. Digital Signatures Using Reversible Public Key Cryptography for the Financial Services Industry (rDSA)"},{"issue":"3","key":"41_CR23","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"M Wiener","year":"1990","unstructured":"Wiener, M.: Cryptanalysis of short RSA secret exponents. IEEE Trans. Info. Theor. 36(3), 553\u2013558 (1990)","journal-title":"IEEE Trans. Info. Theor."}],"container-title":["Lecture Notes in Networks and Systems","Innovations in Smart Cities and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-74500-8_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,13]],"date-time":"2019-10-13T00:23:52Z","timestamp":1570926232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-74500-8_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319744995","9783319745008"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-74500-8_41","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2018]]}}}