{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:49:15Z","timestamp":1775666955529,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2015,7,8]],"date-time":"2015-07-08T00:00:00Z","timestamp":1436313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the NationalNatural Science Foundation of China","award":["11271003"],"award-info":[{"award-number":["11271003"]}]},{"name":"the National Research Foundation for the Doctoral Program of Higher Education of China","award":["20134410110003"],"award-info":[{"award-number":["20134410110003"]}]},{"name":"High Level Talents Project of Guangdong, Guangdong Provincial Natural Science Foundation","award":["S2012010009950"],"award-info":[{"award-number":["S2012010009950"]}]},{"name":"the Project of Department of Education of Guangdong Province","award":["2013KJ-CX0146"],"award-info":[{"award-number":["2013KJ-CX0146"]}]},{"name":"the Natural Science Foundation of Bureau of Education of Guangzhou","award":["2012A004"],"award-info":[{"award-number":["2012A004"]}]},{"name":"basic research major projects of Department of Education of Guangdong Province","award":["2004KZDXM044"],"award-info":[{"award-number":["2004KZDXM044"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s00500-015-1759-5","type":"journal-article","created":{"date-parts":[[2015,7,7]],"date-time":"2015-07-07T04:15:50Z","timestamp":1436242550000},"page":"3735-3744","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":61,"title":["Privacy-preserving face recognition with outsourced computation"],"prefix":"10.1007","volume":"20","author":[{"given":"Can","family":"Xiang","sequence":"first","affiliation":[]},{"given":"Chunming","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Yunlu","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Qiuxia","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,8]]},"reference":[{"key":"1759_CR1","unstructured":"Avidan S, Butman M (2006) Efficient methods for privacy preserving face detection. In: Advances in neural information processing systems (NIPS\u201906), pp 57\u201364"},{"issue":"6","key":"1759_CR2","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s00500-009-0426-0","volume":"14","author":"D Bhattacharjee","year":"2010","unstructured":"Bhattacharjee D, Basu DK, Nasipuri M, Kundu M (2010) Human face recognition using fuzzy multilayer perceptron. Soft Comput 14(6):559\u2013570","journal-title":"Soft Comput"},{"issue":"2","key":"1759_CR3","doi-asserted-by":"crossref","first-page":"259","DOI":"10.3233\/JCS-2012-0447","volume":"20","author":"M Blanton","year":"2012","unstructured":"Blanton M, Aliasgari M (2012) Secure outsourced computation of Iris matching. J Comput Security 20(2):259\u2013305","journal-title":"J Comput Security"},{"key":"1759_CR4","doi-asserted-by":"crossref","unstructured":"Boyen X (2004) Reusable cryptographic fuzzy extractors. In: Proceedings of the 11th ACM conference on Computer and communications security, pp 82\u201391","DOI":"10.1145\/1030083.1030096"},{"issue":"43","key":"1759_CR5","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.future.2014.07.001","volume":"1","author":"A Castiglione","year":"2015","unstructured":"Castiglione A, Pizzolante R, De-Santis A, Carpentieri B, Castiglione A, Palmieri F (2015) Cloud-based adaptive compression and secure management services for 3D healthcare data. Futur Gener Comput Syst 1(43):120\u2013134","journal-title":"Futur Gener Comput Syst"},{"key":"1759_CR6","doi-asserted-by":"crossref","unstructured":"Chang EC, Li Q (2006) Hiding secret points amidst chaff. In: Advances in Cryptology-EUROCRYPT, vol. LNCS 4004, pp 59\u201372","DOI":"10.1007\/11761679_5"},{"issue":"25","key":"1759_CR7","doi-asserted-by":"crossref","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","volume":"9","author":"XF Chen","year":"2014","unstructured":"Chen XF, Li J, Ma J, Tang Q, Lou W (2014) New algorithms for secure outsourcing of modular exponentiations. IEEE Trans Parallel Distrib Syst 9(25):2386\u20132396","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1759_CR8","unstructured":"Damgard IB, Jurik MJ (2001) A generalisation, a simplification and some applications of paillier\u2019s probabilistic public-key system. In: Public-Key Cryptography (PKC\u201901), vol LNCS 1992, pp 119\u2013136"},{"issue":"1","key":"1759_CR9","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1504\/IJACT.2008.017048","volume":"1","author":"I Damgard","year":"2008","unstructured":"Damgard I, Geisler M, Kroigard M (2008) Homomorphic encryption and secure comparison. J Appl Cryptol 1(1):22\u201331","journal-title":"J Appl Cryptol"},{"key":"1759_CR10","unstructured":"Damgard I, Geisler M, Kroigard M (2007) Efficient and secure comparison for online auctions. In: Australasian Conference on Information Security and Privacy (ACISP\u201907), vol LNCS 4586, pp 416\u2013430"},{"key":"1759_CR11","unstructured":"Dijk MV, Gentry C, Halevi S, Vaikuntanathan V (2010) Fully homomorphic encryption over the integers. In: Advances in Cryptology\u2014ASIACRYPT 2010, vol LNCS 6110, pp 24\u201343"},{"issue":"1","key":"1759_CR12","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1137\/060651380","volume":"38","author":"Y Dodis","year":"2008","unstructured":"Dodis Y, Ostrovsky R, Reyzin L, Smith A (2008) Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. SIAM J Comput 38(1):97\u2013139","journal-title":"SIAM J Comput"},{"key":"1759_CR13","doi-asserted-by":"crossref","unstructured":"Dodis Y, Reyzin L, Smith A (2004) Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. In: Advances in cryptology-Eurocrypt, vol LNCS 3027, pp 523\u2013540","DOI":"10.1007\/978-3-540-24676-3_31"},{"key":"1759_CR14","doi-asserted-by":"crossref","unstructured":"Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: Computer vision and pattern recognition workshop, New York, pp 160\u2013160","DOI":"10.1109\/CVPRW.2006.184"},{"key":"1759_CR15","doi-asserted-by":"crossref","unstructured":"Erkin Z, Franz M, Guajardo J, Katzenbeisser S, Lagendijk I, Toft T (2009) Privacy-preserving face recognition. In: Privacy Enhancing Technologies (PET\u201909), vol LNCS 5672, pp 235\u2013253","DOI":"10.1007\/978-3-642-03168-7_14"},{"issue":"4","key":"1759_CR16","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s10586-013-0261-z","volume":"16","author":"C Esposito","year":"2013","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2013) Interconnecting federated clouds by using publish-subscribe service. Clust Comput 16(4):887\u2013903","journal-title":"Clust Comput"},{"key":"1759_CR17","doi-asserted-by":"publisher","unstructured":"Esposito C, Ficco M, Palmieri F, Castiglione A (2015) Smart cloud storage service selection based on fuzzy logic. IEEE Trans Comput, Theory Evid Game Theory (99). doi: 10.1109\/TC.2015.2389952","DOI":"10.1109\/TC.2015.2389952"},{"issue":"2","key":"1759_CR18","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10623-005-6343-z","volume":"38","author":"A Juels","year":"2006","unstructured":"Juels A, Sudan M (2006) A fuzzy vault scheme. Des Codes Cryptogr 38(2):237\u2013257","journal-title":"Des Codes Cryptogr"},{"key":"1759_CR19","doi-asserted-by":"crossref","unstructured":"Kevenaar T (2007) Protection of Biometric Information. In: Security with Noisy Data, pp 169\u2013193","DOI":"10.1007\/978-1-84628-984-2_11"},{"key":"1759_CR20","unstructured":"Li ZZ, Lai TH (2012) Deterministic fully homomorphic encryptions for privacy preserving cloud computing. http:\/\/web.cse.ohio-state.edu\/-lizh\/"},{"issue":"8","key":"1759_CR21","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Huang X, Li JW, Chen XF, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201\u20132210","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"6","key":"1759_CR22","doi-asserted-by":"crossref","first-page":"1615","DOI":"10.1109\/TPDS.2013.284","volume":"25","author":"J Li","year":"2014","unstructured":"Li J, Chen XF, Li MQ, Li JW, Lee P, Lou WJ (2014a) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615\u20131625","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1759_CR23","doi-asserted-by":"crossref","unstructured":"Li J, Chen XF, Li JW, Jia CF, Ma JF, Lou WJ (2013) Fine-grained access control based on outsourced attribute-based encryption. In: Proceeding of The European Symposium on Research in Computer Security (ESORICS), vol LNCS 3184, pp 592\u2013609","DOI":"10.1007\/978-3-642-40203-6_33"},{"key":"1759_CR24","unstructured":"Lindell Y, Pinkas B (2004) A proof of Yao\u2019s protocol for secure two-party computation. In: Cryptology ePrint Archive, Report 2004\/175"},{"key":"1759_CR25","doi-asserted-by":"crossref","unstructured":"Linnartz J, Tuyls P (2003) New shielding functions to enhance privacy and prevent misuse of biometric templates. In: International Conference on Audio and Video Based Biometric Person Authentication, pp 393\u2013402","DOI":"10.1007\/3-540-44887-X_47"},{"key":"1759_CR26","doi-asserted-by":"publisher","unstructured":"Liu XZ, Ye HW (2014) Dual-kernel based 2D linear discriminant analysis for face recognition. J Ambient Intell Hum Comput (4). doi: 10.1007\/s12652-014-0230-2","DOI":"10.1007\/s12652-014-0230-2"},{"key":"1759_CR27","doi-asserted-by":"crossref","unstructured":"Li J, Wang Q, Wang C, Cao N, Ren K, Lou W (2010) Fuzzy keyword search over encrypted data in cloud computing. In: proceeding of the 29th IEEE International Conference on Computer Communications(INFOCOM 2010), pp 441\u2013445","DOI":"10.1109\/INFCOM.2010.5462196"},{"key":"1759_CR28","unstructured":"Naumann I, Hogben G (2008) Privacy features of European aid card specifications. In: Network Security, European Network and Information Security Agency (ENISA), vol 8, pp 9\u201313"},{"issue":"2","key":"1759_CR29","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/TKDE.2005.32","volume":"17","author":"EM Newton","year":"2005","unstructured":"Newton EM, Sweeney L, Malin B (2005) Preserving privacy by de-identifying face images. IEEE Trans Knowl Data Eng 17(2):232\u2013243","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1759_CR30","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology-EUROCRYPT\u201999, vol LNCS 1592, pp 223\u2013238","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1759_CR31","doi-asserted-by":"crossref","unstructured":"Ratha NK, Connell JH, Bolle RM (2001) Enhancing security and privacy in biometrics-based authentication systems. IBM Syst J 40(3):614\u2013634","DOI":"10.1147\/sj.403.0614"},{"key":"1759_CR32","doi-asserted-by":"crossref","unstructured":"Ratha N, Connell J, Bolle R, Chikkerur S (2006) Cancelable biometrics: A case study in fingerprints. In: Proceedings of the 18th International Conference on Pattern Recognition (ICPR), vol IV, pp 370\u2013373","DOI":"10.1109\/ICPR.2006.353"},{"key":"1759_CR33","doi-asserted-by":"crossref","unstructured":"Sadeghi AR, Schneider T, Wehrenberg I (2010) Efficient Privacy-Preserving Face Recognition. In: Information, Security and Cryptology-ICISC 2009, vol LNCS 5984, pp 229\u2013244","DOI":"10.1007\/978-3-642-14423-3_16"},{"key":"1759_CR34","unstructured":"Tang CM, Chen YN (2014) Efficient non-interactive verifiable outsourced computation for arbitrary functions. http:\/\/eprint.iacr.org\/2014\/439"},{"key":"1759_CR35","doi-asserted-by":"crossref","unstructured":"Turk MA, Pentland AP (1991) Face recognition using eigenfaces. In: Proceedings of the IEEE Computer vision and pattern recognition (CVPR\u201991), pp 586\u2013591","DOI":"10.1109\/CVPR.1991.139758"},{"key":"1759_CR36","doi-asserted-by":"crossref","unstructured":"Tuyls P, Akkermans AH, Kevenaar TA, Schrijen GJ, Bazen AM, Veldhuis RN (2005) Practical biometric authentication with template protection. In: Audio- and video-based biometric person authentication (AVBPA), vol LNCS 3546, 436\u2013446","DOI":"10.1007\/11527923_45"},{"key":"1759_CR37","first-page":"326","volume":"2014","author":"YJ Wang","year":"2014","unstructured":"Wang YJ, Wu QH, Wong DS, Qin B, Chow SSM, Liu Z, Tan X (2014) Securely outsourcing exponentiations with single untrusted program for cloud storage. Comput Secur-ESORICS 2014:326\u2013343","journal-title":"Comput Secur-ESORICS"},{"key":"1759_CR38","doi-asserted-by":"crossref","unstructured":"Yao AC (1986) How to generate and exchange secrets. In: Foundations of Computer Science, 1986, 27th Annual Symposium, pp 162\u2013167","DOI":"10.1109\/SFCS.1986.25"},{"key":"1759_CR39","doi-asserted-by":"crossref","unstructured":"Yu X, Chinomi K, Koshimizu T, Nitta N, Ito Y, Babaguchi N (2008) Privacy protecting visual processing for secure video surveillance. In: Proceedings of the International Conference on Image Processing (ICIP\u201908), pp 1672\u20131675","DOI":"10.1109\/ICIP.2008.4712094"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1759-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1759-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1759-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T01:43:49Z","timestamp":1559094229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1759-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,8]]},"references-count":39,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["1759"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1759-5","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,7,8]]}}}