{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:19:17Z","timestamp":1740122357181,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:00:00Z","timestamp":1462752000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"the Opening Project of Sichuan Province University Key Laboratory of Bridge Non-destruction Detecting and Engineering Computing","award":["2015QYJ04"],"award-info":[{"award-number":["2015QYJ04"]}]},{"DOI":"10.13039\/501100004607","name":"Natural Science Foundation of Guangxi Province (CN)","doi-asserted-by":"publisher","award":["2013GXNSFBB053005"],"award-info":[{"award-number":["2013GXNSFBB053005"]}],"id":[{"id":"10.13039\/501100004607","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10586-016-0571-z","type":"journal-article","created":{"date-parts":[[2016,5,9]],"date-time":"2016-05-09T00:01:00Z","timestamp":1462752060000},"page":"811-820","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Secure outsourcing of modular exponentiations in cloud and cluster computing"],"prefix":"10.1007","volume":"19","author":[{"given":"Jun","family":"Ye","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,9]]},"reference":[{"issue":"1","key":"571_CR1","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0022-0000(89)90018-4","volume":"39","author":"M Abadi","year":"1989","unstructured":"Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. J. Comput. Syst. Sci. 39(1), 21\u201350 (1989)","journal-title":"J. Comput. Syst. Sci."},{"key":"571_CR2","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Frikken, K.B.: Securely outsourcing linear algebra computations. In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, pp. 48\u201359. Springer-Verlag, , New York (2010)","DOI":"10.1145\/1755688.1755695"},{"key":"571_CR3","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/S0065-2458(01)80019-X","volume":"54","author":"MJ Atallah","year":"2002","unstructured":"Atallah, M.J., Pantazopoulos, K.N., Rice, J.R., Spafford, E.H.: Secure outsourcing of scientific computations. Adv. Comput. 54, 215\u2013272 (2002)","journal-title":"Adv. Comput."},{"key":"571_CR4","doi-asserted-by":"crossref","unstructured":"Beaver, D., Feigenbaum, J.: Hiding instances in multioracle queries. In: Proceedings of 7th Annual Symposium on Theoretical Aspects of Computer Science (STACS 90), Rouen, France, 22\u201324 Feb, vol. 415, pp. 37\u201348. Springer-Verlag, New York (1990)","DOI":"10.1007\/3-540-52282-4_30"},{"issue":"1","key":"571_CR5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s001459900017","volume":"10","author":"D Beaver","year":"1997","unstructured":"Beaver, D., Feigenbaum, J., Kilian, J., Rogaway, P.: Locally random reductions: Improvements and applications. J. Cryptol. 10(1), 17\u201336 (1997)","journal-title":"J. Cryptol."},{"key":"571_CR6","doi-asserted-by":"crossref","unstructured":"Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Advances in Cryptology\u2013CRYPTO 2011, pp. 111\u2013131. Springer, New York (2011)","DOI":"10.1007\/978-3-642-22792-9_7"},{"key":"571_CR7","doi-asserted-by":"crossref","unstructured":"Benjamin, D., Atallah, M.J.: Private and cheating-free outsourcing of algebraic computations. In: Proceedings of the Sixth Annual Conference on Privacy, Security and Trust, PST, Washington, DC, pp. 483\u2013501. Springer-Verlag, New York (2008)","DOI":"10.1109\/PST.2008.12"},{"key":"571_CR8","first-page":"107","volume":"2","author":"M Blum","year":"1991","unstructured":"Blum, M., Luby, M., Rubinfeld, R.: Program result checking against adaptive programs and in cryptographic settings. DIMACS Ser. Discrete Math. Theor. Comput. Sci. 2, 107\u2013118 (1991)","journal-title":"DIMACS Ser. Discrete Math. Theor. Comput. Sci."},{"key":"571_CR9","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Advances in Cryptology - CRYPTO \u201992, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, 16\u201320 Aug, 1992, pp. 89\u2013105 (1992)"},{"key":"571_CR10","doi-asserted-by":"crossref","unstructured":"Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. In: Proceedinfs of 17th European Symposium on Research in Computer Security, Pisa, Italy, vol. 7459, pp. 541\u2013556. Springer-Verlag, New York (2012)","DOI":"10.1007\/978-3-642-33167-1_31"},{"key":"571_CR11","first-page":"499","volume-title":"Multi-client Non-interactive Verifiable Computation","author":"SG Choi","year":"2013","unstructured":"Choi, S.G., Katz, J., Kumaresan, R., Cid, C.: Multi-client Non-interactive Verifiable Computation, vol. 7785, pp. 499\u2013518. Springer-Verlag, London (2013)"},{"key":"571_CR12","doi-asserted-by":"crossref","unstructured":"Fiore, D., Gennaro, R.: Publicly verifiable delegation of large polynomials and matrix computations, with applications. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 501\u2013512. ACM, New York (2012)","DOI":"10.1145\/2382196.2382250"},{"key":"571_CR13","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: Outsourcing computation to untrusted workers. In: Advances in Cryptology\u2014 CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, 15\u201319 Aug, 2010, pp. 465\u2013482 (2010)"},{"key":"571_CR14","doi-asserted-by":"crossref","unstructured":"M.\u00a0Girault and D.\u00a0Lefranc. Server-aided verification: Theory and practice. In Proc. of 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, volume 3788, pages 605\u2013623. Springer-Verlag, December 2005","DOI":"10.1007\/11593447_33"},{"key":"571_CR15","doi-asserted-by":"crossref","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: TCC, 2005, LNCS, vol. 3378, pp. 264\u2013282. Springer-Verlag, New York (2005)","DOI":"10.1007\/978-3-540-30576-7_15"},{"issue":"3","key":"571_CR16","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1109\/TETC.2014.2316525","volume":"2","author":"C Hu","year":"2014","unstructured":"Hu, C., Xu, Z., Liuand, Y., Mei, L., Chen, L., Luo, X.: Semantic link network-based model for organizing multimedia big data. IEEE Trans. Emerg. Top. Comput. 2(3), 376\u2013387 (2014)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"571_CR17","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Wetzel, S.: Secure server-aided signature generation. In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, 13\u201315, Feb, 2001, pp. 383\u2013401 (2001)","DOI":"10.1007\/3-540-44586-2_28"},{"key":"571_CR18","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/j.future.2013.10.006","volume":"37","author":"J Li","year":"2014","unstructured":"Li, J., Chen, X., Huang, Q., Wong, D.S.: Digital provenance: enabling secure data forensics in cloud computing. Future Gener. Comput. Syst. 37, 259\u2013266 (2014)","journal-title":"Future Gener. Comput. Syst."},{"key":"571_CR19","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1016\/j.future.2013.06.011","volume":"30","author":"J Li","year":"2014","unstructured":"Li, J., Li, J., Chen, X., Liu, Z., Jia, C.: Privacy-preserving data utilization in hybrid clouds. Future Gener. Comput. Syst. 30, 98\u2013106 (2014)","journal-title":"Future Gener. Comput. Syst."},{"key":"571_CR20","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1007\/978-3-0348-8295-8_24","volume":"20","author":"PQ Nguyen","year":"2001","unstructured":"Nguyen, P.Q., Shparlinski, I.E., Stern, J.: Distribution of modular sums and the security of the server aided exponentiation. Cryptogr. Comput. Number Theory 20, 331\u2013342 (2001)","journal-title":"Cryptogr. Comput. Number Theory"},{"key":"571_CR21","doi-asserted-by":"crossref","unstructured":"Parno, B., Howell, J., Gentry, C., Raykova, M.: Pinocchio: Nearly Practical Verifiable Computation, pp. 238\u2013252. Springer-Verlag, Berlin (2013)","DOI":"10.1109\/SP.2013.47"},{"issue":"1","key":"571_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s001459900016","volume":"10","author":"P Rooij","year":"1997","unstructured":"Rooij, P.: On schnorr\u2019s preprocessing for digital signature schemes. J. Cryptol. 10(1), 1\u201316 (1997)","journal-title":"J. Cryptol."},{"issue":"1","key":"571_CR23","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.jnca.2010.07.006","volume":"34","author":"S Subashini","year":"2011","unstructured":"Subashini, S., Kavitha, V.: A survey on security issues in service delivery models of cloud computing. J. Netw. Comput. Appl. 34(1), 1\u201311 (2011)","journal-title":"J. Netw. Comput. Appl."},{"issue":"2","key":"571_CR24","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/s10623-005-3710-8","volume":"39","author":"M Dijk van","year":"2006","unstructured":"van Dijk, M., Clarke, D.E., Gassend, B., Suh, G.E., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Cryptogr. 39(2), 253\u2013273 (2006)","journal-title":"Des. Codes Cryptogr."},{"key":"571_CR25","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wu, Q., Wong, D.S., Qin, B., Chow, S.S.\u00a0M., Liu, Z., Tan, X.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Computer Security\u2014ESORICS 2014\u201419th European Symposium on Research in Computer Security, Wroclaw, Poland, 7\u201311, Sept, 2014, pp. 326\u2013343 (2014)","DOI":"10.1007\/978-3-319-11203-9_19"},{"issue":"2","key":"571_CR26","doi-asserted-by":"crossref","first-page":"667","DOI":"10.2298\/CSIS121104028W","volume":"10","author":"JF Wang","year":"2013","unstructured":"Wang, J.F., Ma, H., Tang, Q., Li, J., Zhu, H., Ma, S.Q., Chen, X.F.: Efficient verifiable fuzzy keyword search over encrypted data in cloud computing. Comput. Sci. Inf. Syst. 10(2), 667\u2013684 (2013)","journal-title":"Comput. Sci. Inf. Syst."},{"key":"571_CR27","doi-asserted-by":"crossref","unstructured":"Wu, W., Mu, Y., Susilo, W., Huang, X.: Server-aided verification signatures: Definitions and new constructions. In: Proceedings of Second International Conference, ProvSec 2008, Shanghai, China, vol. 5324, pp. 141\u2013155. Springer-Verlag, New York (2008)","DOI":"10.1007\/978-3-540-88733-1_10"},{"key":"571_CR28","doi-asserted-by":"publisher","unstructured":"Xu, Z., Liu, Y., Yen, N., Mei, L., Luo, X., Wei, X., Hu, C.: Crowdsourcing based description of urban emergency events using social media big data. IEEE Trans. Cloud Comput. (2016). doi: 10.1109\/TCC.2016.2517638","DOI":"10.1109\/TCC.2016.2517638"},{"issue":"2","key":"571_CR29","first-page":"283","volume":"18","author":"J Ye","year":"2016","unstructured":"Ye, J., Zhang, H., Fu, C.: Verifiable delegation of polynomials. Int. J. Netw. Secur. 18(2), 283\u2013290 (2016)","journal-title":"Int. J. Netw. Secur."},{"issue":"3","key":"571_CR30","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Future Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0571-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0571-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0571-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0571-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T08:15:33Z","timestamp":1567844133000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0571-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,9]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["571"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0571-z","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2016,5,9]]}}}