{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T11:04:06Z","timestamp":1770289446166,"version":"3.49.0"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T00:00:00Z","timestamp":1535673600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672358"],"award-info":[{"award-number":["61672358"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602316"],"award-info":[{"award-number":["61602316"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2017A030310134"],"award-info":[{"award-number":["2017A030310134"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Technology Planning Project from Guangdong Province","award":["2014B010118005"],"award-info":[{"award-number":["2014B010118005"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s00500-018-3489-y","type":"journal-article","created":{"date-parts":[[2018,8,31]],"date-time":"2018-08-31T04:17:10Z","timestamp":1535689030000},"page":"8907-8925","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Secure and efficient parallel hash function construction and its application on cloud audit"],"prefix":"10.1007","volume":"23","author":[{"given":"Yijun","family":"Yang","sequence":"first","affiliation":[]},{"given":"Fei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhiwei","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Shulan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianyong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"Ming","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,31]]},"reference":[{"issue":"1","key":"3489_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1687-6180-2013-126","volume":"2013","author":"A Akhavan","year":"2013","unstructured":"Akhavan A, Samsudin A, Akshani A (2013) A novel parallel hash function based on 3D chaotic map. EURASIP J Adv Signal Process 2013(1):1\u201312","journal-title":"EURASIP J Adv Signal Process"},{"issue":"2","key":"3489_CR2","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1109\/TCC.2014.2359460","volume":"3","author":"J Baek","year":"2015","unstructured":"Baek J, Vu QH, Liu JK, Huang X, Xiang Y (2015) A secure cloud computing based framework for big data information management of smart grid. IEEE Trans Cloud Comput 3(2):233\u2013244","journal-title":"IEEE Trans Cloud Comput"},{"key":"3489_CR3","unstructured":"Bertoni G, Daeman J, Peeters M (2007) Sponge functions. In: ECRYPT hash workshop 2007. \n                    http:\/\/www.csrc.nist.gov\/pki\/HashWorkshop\/PublicComments\/2007May.html"},{"key":"3489_CR4","unstructured":"Biham E, Dunkelman O (20017) A framework for iterative hash functions\u2014HAIFA. cryptology ePrint archive: report 2007\/278"},{"key":"3489_CR5","first-page":"293","volume":"765","author":"BD Boer","year":"1994","unstructured":"Boer BD, Bosselaers A (1994) Collisions for the compression function of MD5. Eurocrypt 1993. LNCS 765:293\u2013304","journal-title":"LNCS"},{"key":"3489_CR6","first-page":"56","volume":"1462","author":"F Chabaud","year":"1998","unstructured":"Chabaud F, Joux A (1998) Differential collisions in SHA-0. Crypto 1998. LNCS 1462:56\u201371","journal-title":"LNCS"},{"issue":"4","key":"3489_CR7","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MPRV.2013.72","volume":"12","author":"C-K Chu","year":"2013","unstructured":"Chu C-K, Zhu WT, Han J, Liu JK, Xu J, Zhou J (2013) Security concerns in popular cloud storage services. IEEE Pervasive Comput 12(4):50\u201357","journal-title":"IEEE Pervasive Comput"},{"key":"3489_CR8","doi-asserted-by":"crossref","unstructured":"Deswarte Y, Quisquater J (2004) Remote integrity checking. In: Proceedings of 5th working conference integrity and intl control in information system, pp 1\u201311","DOI":"10.1007\/1-4020-7901-X_1"},{"key":"3489_CR9","unstructured":"Dobbertin H (1996) Cryptanalysis of MD5 compress. Presented at the rump session of Eurocrypt 1996"},{"key":"3489_CR10","unstructured":"Donghoon C, Mridul N, Moti Y (2011) Indifferentiability of hash algorithm BLAKE. IACR ePrint archive, report"},{"key":"3489_CR11","unstructured":"Gazzoni F, Barreto P (2006) Demonstrating data possession and uncheatable data transfer. IACR cryptology ePrint archive, report"},{"key":"3489_CR12","doi-asserted-by":"publisher","first-page":"1123","DOI":"10.1007\/s11071-015-2392-7","volume":"83","author":"R Guesmi","year":"2016","unstructured":"Guesmi R, Farah MAB, Kachouri A, Samet M (2016) A novel chaos-based image encryption using DNA sequence operation and secure hash algorithm SHA-2. Nonlinear Dyn 83:1123\u20131136","journal-title":"Nonlinear Dyn"},{"key":"3489_CR13","unstructured":"Hawkes P, Paddon M, Rose G (2004) On corrective patterns for the SHA-2 family. Cryptology ePrint archive, report 2004\/207"},{"issue":"2","key":"3489_CR14","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.3233\/JIFS-169147","volume":"32","author":"J Horalek","year":"2017","unstructured":"Horalek J, Holik F, Horak O (2017) Analysis of the use of rainbow tables to break hash. J Intell Fuzzy Syst 32(2):1523\u20131534","journal-title":"J Intell Fuzzy Syst"},{"key":"3489_CR15","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1007\/s11071-015-2049-6","volume":"81","author":"ST Je","year":"2015","unstructured":"Je ST, Azman S, Amir A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlinear Dyn 81:1067\u20131079","journal-title":"Nonlinear Dyn"},{"key":"3489_CR16","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.future.2014.11.002","volume":"52","author":"T Jiang","year":"2015","unstructured":"Jiang T, Chen X, Li J, Wong DS, Ma J, Liu JK (2015) Towards secure and reliable cloud storage against data re-outsourcing. Future Gener Comput Syst 52:86\u201394","journal-title":"Future Gener Comput Syst"},{"issue":"9","key":"3489_CR17","first-page":"1","volume":"13","author":"H Jin","year":"2014","unstructured":"Jin H, Jiang H, Zhou K (2014) Dynamic and public audit with fair arbitration for cloud data. IEEE Trans Cloud Comput 13(9):1\u201314","journal-title":"IEEE Trans Cloud Comput"},{"issue":"4","key":"3489_CR18","doi-asserted-by":"publisher","first-page":"1650026","DOI":"10.1142\/S0218126616500262","volume":"25","author":"F Kahri","year":"2015","unstructured":"Kahri F, Mestiri H, Bouallegue B (2015) High speed FPGA implementation of cryptographic keccak hash function crypto-processor. J Circuits Syst Comput 25(4):1650026","journal-title":"J Circuits Syst Comput"},{"key":"3489_CR19","doi-asserted-by":"crossref","unstructured":"Liang K, Liu JK, Wong DS, Susilo W (2014) An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: European symposium on research in computer security (ESORICS). Lecture notes in computer science, vol. 8712, Springer, pp 257\u2013272","DOI":"10.1007\/978-3-319-11203-9_15"},{"key":"3489_CR20","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.cnsns.2012.06.019","volume":"18","author":"A Kanso","year":"2012","unstructured":"Kanso A, Ghebleh M (2012) A fast and efficient chaos-based keyed hash function. Commun Nonlinear Sci Numer Simul 18:109\u2013123","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3489_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s11071-015-1970-z","volume":"81","author":"A Kanso","year":"2015","unstructured":"Kanso A, Ghebleh M (2015) A structure-based chaotic hashing scheme. Nonlinear Dyn 81:27\u201340","journal-title":"Nonlinear Dyn"},{"issue":"3","key":"3489_CR22","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1109\/TIT.2011.2173655","volume":"58","author":"J Lee","year":"2012","unstructured":"Lee J, Hong D (2012) Collision resistance of the JH hash function. IEEE Trans Inf Theory 58(3):1992\u20131995","journal-title":"IEEE Trans Inf Theory"},{"issue":"4","key":"3489_CR23","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1007\/BF01457454","volume":"261","author":"AK Lenstra","year":"1982","unstructured":"Lenstra AK, Lenstra HW, Lovasz L (1982) Factoring polynomial with rational coefficients. Math Ann 261(4):515\u2013534","journal-title":"Math Ann"},{"issue":"1","key":"3489_CR24","first-page":"536","volume":"11","author":"W Li","year":"2017","unstructured":"Li W, Gao Z (2017) Gu. D.: Security analysis of whirlpool hash function in the cloud of things. KSII Trans Internet. Inf Syst. 11(1):536\u2013551","journal-title":"Inf Syst."},{"issue":"1","key":"3489_CR25","first-page":"7","volume":"18","author":"Y Li","year":"2012","unstructured":"Li Y, Xiao D, Deng S (2012) Secure hash function based on chaotic tent map with changeable parameter. High Technol Lett 18(1):7\u201312","journal-title":"High Technol Lett"},{"key":"3489_CR26","unstructured":"Liang J, Lai X (2005) Improved collision attack on hash function MD5. Technical report"},{"issue":"10","key":"3489_CR27","doi-asserted-by":"publisher","first-page":"1667","DOI":"10.1109\/TIFS.2014.2346023","volume":"9","author":"K Liang","year":"2014","unstructured":"Liang K, Au MH, Liu JK, Qi X, Susilo W, Tran XP, Wong DS, Yang G (2014b) A DFA-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans Inf Forensics Secur 9(10):1667\u20131680","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3489_CR28","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/j.future.2014.11.016","volume":"52","author":"K Liang","year":"2015","unstructured":"Liang K, Au MH, Liu JK, Susilo W, Wong DS, Yang G, Yu Y, Yang A (2015a) A secure and expressive ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener Comput Syst 52:95\u2013108","journal-title":"Future Gener Comput Syst"},{"issue":"8","key":"3489_CR29","doi-asserted-by":"publisher","first-page":"1578","DOI":"10.1109\/TIFS.2015.2419186","volume":"10","author":"K Liang","year":"2015","unstructured":"Liang K, Susilo W, Liu JK (2015b) Privacy-preserving ciphertext sharing mechanism for big data storage. IEEE Trans Inf Forensics Secur 10(8):1578\u20131589","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"2","key":"3489_CR30","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MNET.2015.7064902","volume":"29","author":"JK Liu","year":"2015","unstructured":"Liu JK, Au MH, Susilo W, Liang K, Lu R, Srinivasan B (2015) Secure sharing and searching for real-time video data in mobile cloud. IEEE Network 29(2):46\u201350","journal-title":"IEEE Network"},{"issue":"3","key":"3489_CR31","doi-asserted-by":"publisher","first-page":"484","DOI":"10.1109\/TIFS.2015.2493983","volume":"11","author":"JK Liu","year":"2016","unstructured":"Liu JK, Au MH, Huang X, Lu R, Li J (2016a) Fine-grained two-factor access control for web-based cloud computing services. IEEE Trans Inf Forensics Secur 11(3):484\u2013497","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"3489_CR32","doi-asserted-by":"publisher","first-page":"1992","DOI":"10.1109\/TC.2015.2462840","volume":"65","author":"JK Liu","year":"2016","unstructured":"Liu JK, Liang K, Susilo W, Liu J, Xiang Y (2016b) Two-factor data security protection mechanism for cloud storage system. IEEE Trans Comput 65(6):1992\u20132004","journal-title":"IEEE Trans Comput"},{"key":"3489_CR33","first-page":"474","volume":"3788","author":"S Lucks","year":"2005","unstructured":"Lucks S (2005) A failure-friendly design principle for hash functions Asiacrypt. LNCS 3788:474\u2013494","journal-title":"LNCS"},{"key":"3489_CR34","first-page":"262","volume-title":"Advances in cryptology-EUROCRYPT2013. Lecture notes in computer science","author":"F Mendel","year":"2013","unstructured":"Mendel F, Nad T, Schlaffer M (2013) Improving local collisions: new attacks on reduced SHA-256. In: Johansson T, Nguyen P (eds) Advances in cryptology-EUROCRYPT2013. Lecture notes in computer science, vol 7881. Springer, Berlin, pp 262\u2013278"},{"key":"3489_CR35","unstructured":"NIST (2012) Selects winner of secure hash algorithm (SHA-3) competition. NIST. 2012-10-02. Retrieved from 2 Oct 2012"},{"key":"3489_CR36","doi-asserted-by":"crossref","unstructured":"Nouri M, Khezeli A, Ramezani A, Ebrahimi A (2012) A dynamic chaotic hash function based upon circle chord methods. In: 2012 6th international symposium on telecommunications, IST 2012, pp 1044\u20131049","DOI":"10.1109\/ISTEL.2012.6483140"},{"issue":"1","key":"3489_CR37","doi-asserted-by":"publisher","first-page":"24","DOI":"10.15837\/ijccc.2014.1.867","volume":"9","author":"M Nouri","year":"2014","unstructured":"Nouri M, Safarinia M, Pourmahdi P (2014) The parallel one-way hash function based on Chebyshev\u2013Halley methods with variable parameter. Int J Comput Commun Control 9(1):24\u201336","journal-title":"Int J Comput Commun Control"},{"issue":"1","key":"3489_CR38","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1109\/TC.2015.2417524","volume":"65","author":"P Salvatore","year":"2016","unstructured":"Salvatore P, Pedro R, Juan AM (2016) Parallel d-pipeline: a Cuckoo hashing implementation for increased throughput. IEEE Trans Comput 65(1):326\u2013331","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"3489_CR39","first-page":"37","volume":"90-A","author":"Y Sasaki","year":"2007","unstructured":"Sasaki Y, Naito Y, Kunihiro N, Ohta K (2007) Improved collision attacks on MD4 and MD5. IEICE Trans 90-A(1):37\u201347","journal-title":"IEICE Trans"},{"key":"3489_CR40","doi-asserted-by":"crossref","unstructured":"Scott M, Costitgan N, Abdulwahab W (2006) Implementing cryptographic pairings on smartcards. In: Goubin L, Matsui M (eds) CHES 2006, LNCS, vol. 4249. Springer, pp 134\u2013147","DOI":"10.1007\/11894063_11"},{"key":"3489_CR41","doi-asserted-by":"crossref","unstructured":"Stevens M (2013) New collision attacks on SHA-1 based on optimal joint local-collision analysis. In: Johansson T, Nguyen PQ (eds) EUROCRYPT, Lecture notes in computer science, vol 7881. Springer, pp 245\u2013261","DOI":"10.1007\/978-3-642-38348-9_15"},{"issue":"7","key":"3489_CR42","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1016\/j.cnsns.2010.10.001","volume":"16","author":"Y Wang","year":"2011","unstructured":"Wang Y, Wong KW, Xiao D (2011) Parallel hash function construction based on coupled map lattices. Commun Nonlinear Sci Numer Simul 16(7):2810\u20132821","journal-title":"Commun Nonlinear Sci Numer Simul"},{"key":"3489_CR43","unstructured":"Wang X, Feng D, Lai X, Yu H (2004) Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD. Cryptology ePrint archive, report 2004\/199"},{"key":"3489_CR44","first-page":"17","volume-title":"Advances in cryptology-CRYPTO2005. Lecture notes in computer science","author":"X Wang","year":"2005","unstructured":"Wang X, Yin Y, Yu H (2005) Finding collisions in the full SHA-1. In: Shoup V (ed) Advances in cryptology-CRYPTO2005. Lecture notes in computer science, vol 3621. Springer, Berlin, pp 17\u201336"},{"key":"3489_CR45","doi-asserted-by":"crossref","unstructured":"Wang Y, Yang D, Du M, Yang H (2007) One-way hash function construction based on iterating a chaotic map. In: Proceedings\u2014CIS workshops 2007, 2007 international conference on computational intelligence and security workshops, pp 791\u2013794","DOI":"10.1109\/CISW.2007.4425614"},{"issue":"1","key":"3489_CR46","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1109\/TSC.2013.2295611","volume":"8","author":"BY Wang","year":"2015","unstructured":"Wang BY, Li BC, Li H (2015) Panda: public audit for shared data with efficient user revocation in the cloud. IEEE Trans Serv Comput 8(1):92\u2013106","journal-title":"IEEE Trans Serv Comput"},{"issue":"6","key":"3489_CR47","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1109\/TIFS.2016.2523941","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Zhou J, Jianping Yu, Liu JK, Chen J (2016a) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans Inf Forensics Secur 11(6):1265\u20131277","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"3489_CR48","doi-asserted-by":"publisher","first-page":"1661","DOI":"10.1109\/TIFS.2016.2549004","volume":"11","author":"S Wang","year":"2016","unstructured":"Wang S, Liang K, Liu JK, Chen J, Jianping Yu, Xie W (2016b) Attribute-based data sharing scheme revisited in cloud computing. IEEE Trans Inf Forensics Secur 11(8):1661\u20131673","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"3489_CR49","first-page":"602","volume":"7","author":"S Wimol","year":"2016","unstructured":"Wimol S, Warakorn S (2016) A robust hash function using cross-coupled chaotic maps with absolute-valued sinusoidal nonlinearity. Int J Adv Comput Sci Appl 7(1):602\u2013611","journal-title":"Int J Adv Comput Sci Appl"},{"issue":"10","key":"3489_CR50","doi-asserted-by":"publisher","first-page":"2643","DOI":"10.1007\/s00500-015-1964-2","volume":"21","author":"W Wu","year":"2017","unstructured":"Wu W, Hu S, Yang X, Liu JK, Au MH (2017) Towards secure and cost-effective fuzzy access control in mobile cloud computing. Soft Comput 21(10):2643\u20132649","journal-title":"Soft Comput"},{"issue":"1","key":"3489_CR51","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1007\/s11277-015-2654-1","volume":"84","author":"YJ Yang","year":"2015","unstructured":"Yang YJ, Yu JP, Zhang Q, Meng FY (2015a) Improved hash functions for cancelable fingerprint encryption schemes. Wireless Pers Commun 84(1):643\u2013669","journal-title":"Wireless Pers Commun"},{"key":"3489_CR52","doi-asserted-by":"crossref","unstructured":"Yang Y, Liu JK, Liang K, Choo R, Zhou J (2015) Extended proxy-assisted approach: achieving revocable fine-grained cloud data encryption. In: European symposium on research in computer security (ESORICS (2)). Lecture notes in computer science, vol 9327, Springer, pp 146\u2013166","DOI":"10.1007\/978-3-319-24177-7_8"},{"key":"3489_CR53","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11071-015-2465-7","volume":"83","author":"GD Ye","year":"2016","unstructured":"Ye GD, Zhao HQ, Chai HJ (2016) Chaotic image encryption algorithm using wave-line permutation and block diffusion. Nonlinear Dyn 83:2067\u20132077","journal-title":"Nonlinear Dyn"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3489-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-018-3489-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-018-3489-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,19]],"date-time":"2020-01-19T00:45:14Z","timestamp":1579394714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-018-3489-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,31]]},"references-count":53,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["3489"],"URL":"https:\/\/doi.org\/10.1007\/s00500-018-3489-y","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,31]]},"assertion":[{"value":"31 August 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}