{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:50:35Z","timestamp":1762005035816,"version":"3.41.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T00:00:00Z","timestamp":1529971200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Cryptography Development Fund of China","award":["MMJJ20170112"],"award-info":[{"award-number":["MMJJ20170112"]}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["61772550","61572521"],"award-info":[{"award-number":["61772550","61572521"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Nature Science Foundation of China","doi-asserted-by":"crossref","award":["U1636114","61402531"],"award-info":[{"award-number":["U1636114","61402531"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["GCIS201610"],"award-info":[{"award-number":["GCIS201610"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00607-018-0641-6","type":"journal-article","created":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T04:21:25Z","timestamp":1529986885000},"page":"773-790","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Improved publicly verifiable group sum evaluation over outsourced data streams in IoT setting"],"prefix":"10.1007","volume":"101","author":[{"given":"Xu An","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yudong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Arun Kumar","family":"Sangaiah","sequence":"additional","affiliation":[]},{"given":"Jindan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,26]]},"reference":[{"key":"641_CR1","doi-asserted-by":"crossref","unstructured":"Ateniese G, Burns R, Curtmola R, Herring J, Kissner L, Peterson Z, Song D (2007) Provable data possession at untrusted stores. In: CCS 07, pp 598\u2013609","DOI":"10.1145\/1315245.1315318"},{"key":"641_CR2","doi-asserted-by":"crossref","unstructured":"Boneh D, Freeman DM (2011) Homomorphic signatures for polynomial functions. In: Advances in cryptology-EUROCRYPT. Springer, pp 149\u2013168","DOI":"10.1007\/978-3-642-20465-4_10"},{"key":"641_CR3","unstructured":"Catalano D, Fiore D (2013) Practical homomorphic macs forarithmetic circuits. In: Advances in cryptology-EUROCRYPT. Springer, pp 336\u2013352"},{"issue":"2","key":"641_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1504\/IJSSC.2014.062468","volume":"4","author":"D Cristina","year":"2014","unstructured":"Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space-Based Situat Comput 4(2):77\u201387","journal-title":"Int J Space-Based Situat Comput"},{"key":"641_CR5","doi-asserted-by":"crossref","unstructured":"Choi SG, Katz J, Kumaresan R, Cid C (2013) Multi-client non-interactive verifiable computation. In: Theory of cryptography. Springer, pp 499\u2013518","DOI":"10.1007\/978-3-642-36594-2_28"},{"key":"641_CR6","doi-asserted-by":"crossref","unstructured":"Chung KM, Kalai Y, Vadhan S (2010) Improved delegation of computation using fully homomorphic encryption. In: Advances in cryptology-CRYPTO. Springer, pp 483\u2013501","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"641_CR7","doi-asserted-by":"crossref","unstructured":"Fiore D, Gennaro R (2012) Publicly verifiable delegation of large polynomials and matrix computations, with applications. In: ACM conference on computer and communications security. ACM, pp 501\u2013512","DOI":"10.1145\/2382196.2382250"},{"key":"641_CR8","doi-asserted-by":"crossref","unstructured":"Gennaro R, Gentry C, Parno B (2010) Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in cryptology-CRYPTO. Springer, pp 465\u2013482","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"641_CR9","doi-asserted-by":"crossref","unstructured":"Gordon SD, Katz J, Liu F-H, Shi E, Zhou H-S (2015) Multi-client verifiable computation with stronger security guarantees. In: Theory of cryptography. Springer, pp 144\u2013166","DOI":"10.1007\/978-3-662-46497-7_6"},{"issue":"2","key":"641_CR10","first-page":"1","volume":"6","author":"S Guo","year":"2015","unstructured":"Guo S, Xu H (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid Util Comput 6(2):1\u20137","journal-title":"Int J Grid Util Comput"},{"key":"641_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2761806","author":"D He","year":"2018","unstructured":"He D, Kumar N, Zeadally S, Wang H (2018) Certificateless provable data possession scheme for cloud-based smart grid data management systems. IEEE Trans Ind Inf. https:\/\/doi.org\/10.1109\/TII.2017.2761806","journal-title":"IEEE Trans Ind Inf"},{"key":"641_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Wu L (2015) Certificateless public auditing scheme for cloud-assisted wireless body area networks. IEEE Syst J. https:\/\/doi.org\/10.1109\/JSYST.2015.2428620","journal-title":"IEEE Syst J"},{"key":"641_CR13","doi-asserted-by":"crossref","unstructured":"jPBC: java pairing based cryptography. In: Proceeding of the 16th IEEE symposium on computers and communications, ISCC 2011, pp 850\u2013855. http:\/\/gas.dia.unisa.it\/projects\/jpbc\/","DOI":"10.1109\/ISCC.2011.5983948"},{"issue":"6","key":"641_CR14","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1109\/TPDS.2012.331","volume":"24","author":"X Liu","year":"2013","unstructured":"Liu X, Zhang Y, Wang B, Yan J (2013) Mona: secure multiowner data sharing for dynamic groups in the cloud. IEEE Trans Parallel Distrib Syst 24(6):1182\u20131191","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"5","key":"641_CR15","doi-asserted-by":"publisher","first-page":"826","DOI":"10.1109\/TSC.2016.2531665","volume":"10","author":"X Liu","year":"2017","unstructured":"Liu X, Sun W, Quan H, Lou W, Zhang Y, Li H (2017) Publicly verifiable inner product evaluation over outsourced data streams under multiple keys. IEEE Trans Serv Comput 10(5):826\u2013838. https:\/\/doi.org\/10.1109\/TSC.2016.2531665","journal-title":"IEEE Trans Serv Comput"},{"key":"641_CR16","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2816656","author":"X Liu","year":"2018","unstructured":"Liu X, Deng R, Choo K, Yang Y, Pang HH (2018) Privacy-preserving outsourced calculation toolkit in the Cloud. IEEE Trans Dependable Secure Comput. https:\/\/doi.org\/10.1109\/TDSC.2018.2816656","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"641_CR17","doi-asserted-by":"publisher","first-page":"655","DOI":"10.1109\/JBHI.2015.2407157","volume":"20","author":"X Liu","year":"2016","unstructured":"Liu X, Lu R, Ma J, Chen L, Chen B (2016) Privacy-preserving patient-centric clinical decision support system on naive Bayesian classification. IEEE J Biomed Health Inf 20(2):655\u2013668","journal-title":"IEEE J Biomed Health Inf"},{"issue":"1","key":"641_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TDSC.2016.2536601","volume":"15","author":"X Liu","year":"2018","unstructured":"Liu X, Choo R, Deng R, Lu R, Weng J (2018) Efficient and privacy-preserving outsourced computation of rational numbers. IEEE Trans Dependable Secure Comput 15(1):27\u201339. https:\/\/doi.org\/10.1109\/TDSC.2016.2536601","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"2","key":"641_CR19","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1504\/IJSSC.2014.062469","volume":"4","author":"T Meriem","year":"2014","unstructured":"Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space-Based Situat Comput 4(2):88\u201399","journal-title":"Int J Space-Based Situat Comput"},{"key":"641_CR20","doi-asserted-by":"crossref","unstructured":"Nath S, Venkatesan R (2013) Publicly verifiable grouped aggregation queries on outsourced data streams. In: International conference on data engineering. IEEE, pp 517\u2013528","DOI":"10.1109\/ICDE.2013.6544852"},{"key":"641_CR21","unstructured":"Papadopoulos S, Cormode G, Deligiannakis A, Garofalakis M (2013) Lightweight authentication of linear algebraic querieson data streams. In: International conference on management of data. ACM, pp 881\u2013892"},{"key":"641_CR22","doi-asserted-by":"crossref","unstructured":"Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Theory of cryptography. Springer, pp 422\u2013439","DOI":"10.1007\/978-3-642-28914-9_24"},{"key":"641_CR23","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-540-89255-7_7","volume-title":"ASIACRYPT 2008","author":"H Shacham","year":"2008","unstructured":"Shacham H, Waters B (2008) Compact proofs of retrievability. In: Pieprzyk J (ed) ASIACRYPT 2008, vol 5350. Springer, Heidelberg, pp 90\u2013107 LNCS"},{"key":"641_CR24","doi-asserted-by":"crossref","unstructured":"Sun W, Liu X, Lou W, Hou YT, Li H (2015) Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: 2015 IEEE conference on computer communications (INFOCOM). IEEE, pp 2110\u20132118","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"641_CR25","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2512589","author":"H Tian","year":"2015","unstructured":"Tian H, Chen Y, Chang C, Jiang H, Huang Y, Chen Y, Liu J (2015) Dynamic-hash-table based public auditing for secure cloud storage. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2015.2512589","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"641_CR26","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJGUC.2016.073773","volume":"7","author":"Y Wang","year":"2016","unstructured":"Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced PNG images in cloud storage. Int J Grid Util Comput 7(1):22\u201328","journal-title":"Int J Grid Util Comput"},{"key":"641_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2014.10.006","author":"Y Yu","year":"2014","unstructured":"Yu Y, Zhang Y, Ni J, Au M, Chen L, Liu H (2014) Remote data possession checking with enhanced security for cloud storage. Future Gener Comput Syst. https:\/\/doi.org\/10.1016\/j.future.2014.10.006","journal-title":"Future Gener Comput Syst"},{"key":"641_CR28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2615853","author":"Y Yu","year":"2017","unstructured":"Yu Y, Au MH, Ateniese G, Huang X, Susilo W, Dai Y, Min G (2017) Identity-based remote data integrity checking with perfect data privacy preserving for cloud storage. IEEE Trans Inf Forens Secur. https:\/\/doi.org\/10.1109\/TIFS.2016.2615853","journal-title":"IEEE Trans Inf Forens Secur"},{"issue":"3","key":"641_CR29","doi-asserted-by":"publisher","first-page":"658","DOI":"10.1109\/TIFS.2015.2501728","volume":"11","author":"Y Yu","year":"2016","unstructured":"Yu Y, Li Y, Ni J, Yang G, Mu Y, Susilo W (2016) Comments on \u201cpublic integrity auditing for dynamic data sharing with multi-user modification\u201d. IEEE Trans Inf Forens Secur 11(3):658\u2013659","journal-title":"IEEE Trans Inf Forens Secur"},{"key":"641_CR30","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.future.2017.06.025","volume":"84","author":"Y Yang","year":"2017","unstructured":"Yang Y, Zheng X, Liu X, Zhong S, Chang V (2017) Cross-domain dynamic anonymous authenticated group key management with symptom-matching for E-health social system. Future Gener Comput Syst 84:160\u2013176","journal-title":"Future Gener Comput Syst"},{"issue":"2","key":"641_CR31","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJGUC.2015.068824","volume":"6","author":"S Zhu","year":"2015","unstructured":"Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91\u201397","journal-title":"Int J Grid Util Comput"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0641-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00607-018-0641-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-018-0641-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T09:43:10Z","timestamp":1751708590000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00607-018-0641-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,26]]},"references-count":31,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["641"],"URL":"https:\/\/doi.org\/10.1007\/s00607-018-0641-6","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2018,6,26]]},"assertion":[{"value":"31 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}