{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:51:00Z","timestamp":1758268260252,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T00:00:00Z","timestamp":1532476800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572255","61702266"],"award-info":[{"award-number":["61572255","61702266"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20150787"],"award-info":[{"award-number":["BK20150787"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Six talent peaks project of Jiangsu Province","award":["XYDXXJS-032"],"award-info":[{"award-number":["XYDXXJS-032"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10586-018-2830-7","type":"journal-article","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:10:08Z","timestamp":1532520608000},"page":"1933-1947","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Secure outsourcing algorithms of modular exponentiations with optimal checkability based on a single untrusted cloud server"],"prefix":"10.1007","volume":"21","author":[{"given":"Anmin","family":"Fu","sequence":"first","affiliation":[]},{"given":"Yiming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,25]]},"reference":[{"issue":"1","key":"2830_CR1","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/MIC.2012.14","volume":"16","author":"K Ren","year":"2012","unstructured":"Ren, K., Wang, C., Wang, Q.: Security challenges for the public cloud. IEEE Internet Comput. 16(1), 69\u201373 (2012)","journal-title":"IEEE Internet Comput."},{"issue":"6","key":"2830_CR2","doi-asserted-by":"publisher","first-page":"2751","DOI":"10.1109\/ACCESS.2016.2577036","volume":"4","author":"S Yu","year":"2016","unstructured":"Yu, S.: Big privacy: challenges and opportunities of privacy study in the age of big data. IEEE Access 4(6), 2751\u20132763 (2016)","journal-title":"IEEE Access"},{"issue":"2","key":"2830_CR3","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s10115-015-0830-y","volume":"46","author":"A Gani","year":"2016","unstructured":"Gani, A., Siddiqa, A., Shamshirband, S., et al.: A survey on indexing techniques for big data: taxonomy and performance evaluation. Knowl. Inf. Syst. 46(2), 241\u2013284 (2016)","journal-title":"Knowl. Inf. Syst."},{"key":"2830_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11227-017-2102-y","volume":"74","author":"PGV Naranjo","year":"2018","unstructured":"Naranjo, P.G.V., Baccarelli, E., Scarpiniti, M.: Design and energy-efficient resource management of virtualized networked Fog architectures for the real-time support of IoT applications. J. Supercomput. 74, 1\u201338 (2018)","journal-title":"J. Supercomput."},{"key":"2830_CR5","doi-asserted-by":"crossref","unstructured":"Pooranian Z. et al.: RARE: defeating side channels based on data-deduplication in cloud storage. In: Proceeding of the INFOCOM CCSNA, pp. 1\u20136 (2018)","DOI":"10.1109\/INFCOMW.2018.8406888"},{"issue":"4","key":"2830_CR6","doi-asserted-by":"publisher","first-page":"651","DOI":"10.1007\/s10723-015-9352-9","volume":"13","author":"AN Khan","year":"2015","unstructured":"Khan, A.N., Kiah, M.L.M., Ali, M., et al.: A cloud-manager-based re-encryption scheme for mobile users in cloud environment: a hybrid approach. J. Grid Comput. 13(4), 651\u2013675 (2015)","journal-title":"J. Grid Comput."},{"issue":"21","key":"2830_CR7","doi-asserted-by":"publisher","first-page":"4256","DOI":"10.1002\/cpe.4256","volume":"29","author":"B Jan","year":"2017","unstructured":"Jan, B., Khan, F.G., Montrucchio, B., et al.: Introducing ToPe-FFT: an OpenCL-based FFT library targeting GPUs. Concurr. Comput. 29(21), 4256 (2017)","journal-title":"Concurr. Comput."},{"issue":"1","key":"2830_CR8","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1504\/IJGUC.2015.066397","volume":"6","author":"S Javanmardi","year":"2014","unstructured":"Javanmardi, S., Shojafar, M., Shariatmadari, S., et al.: Fr trust: a fuzzy reputation-based model for trust management in semantic p2p grids. Int. J. Grid Util. Comput. 6(1), 57\u201366 (2014)","journal-title":"Int. J. Grid Util. Comput."},{"key":"2830_CR9","doi-asserted-by":"crossref","unstructured":"Javanmardi, S., Shojafar, M., Amendola, D. et al.: Hybrid job scheduling algorithm for cloud computing environment. InL Proceeding of the IBICA, pp. 43\u201352 (2014)","DOI":"10.1007\/978-3-319-08156-4_5"},{"key":"2830_CR10","doi-asserted-by":"crossref","unstructured":"Chaum, D., Pedersen, T.P.: Wallet databases with observers. In: Proceeding of the CRYPTO, pp. 89\u2013105 (1992)","DOI":"10.1007\/3-540-48071-4_7"},{"key":"2830_CR11","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","volume-title":"Theory of Cryptography","author":"Susan Hohenberger","year":"2005","unstructured":"Hohenberger, S., Lysyanskaya, A.: How to securely outsource cryptographic computations. In: Proceeding of the TCC, pp. 264\u2013282 (2005)"},{"key":"2830_CR12","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2701347","author":"A Fu","year":"2017","unstructured":"Fu, A., Yu, S., Zhang, Y., et al.: NPP: a new privacy-aware public auditing scheme for cloud data sharing with group users. IEEE Transac. Big Data (2017). https:\/\/doi.org\/10.1109\/TBDATA.2017.2701347","journal-title":"IEEE Transac. Big Data"},{"key":"2830_CR13","doi-asserted-by":"crossref","unstructured":"Huang, L., Zhang, G., Fu, A.: Privacy-preserving public auditing for non-manager group. In: Proceeding of the IEEE ICC, pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7997370"},{"key":"2830_CR14","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.jnca.2017.12.007","volume":"104","author":"A Fu","year":"2018","unstructured":"Fu, A., Li, Y., Yu, S., Yu, Y., Zhang, G.: DIPOR: an IDA-based dynamic proof of retrievability scheme for cloud storage systems. J. Netw Comput. Appl. 104, 97\u2013106 (2018)","journal-title":"J. Netw Comput. Appl."},{"key":"2830_CR15","doi-asserted-by":"crossref","unstructured":"Yu, Y., Luo, Y., Wang, D. et al.: Efficient, secure and non-iterative outsourcing of large-scale systems of linear equations. In Proceeding of the IEEE ICC, pp. 1\u20136 (2016)","DOI":"10.1109\/ICC.2016.7510991"},{"issue":"9","key":"2830_CR16","doi-asserted-by":"publisher","first-page":"2386","DOI":"10.1109\/TPDS.2013.180","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Ma, J., et al.: New algorithms for secure outsourcing of modular exponentiations. IEEE Trans. Parallel Distrib. Syst. 25(9), 2386\u20132396 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2830_CR17","doi-asserted-by":"crossref","unstructured":"Ye, J., Chen, X., Ma. J.: An improved algorithm for secure outsourcing of modular exponentiations. In: Proceeding of the IEEE AINA, pp. 73\u201376 (2015)","DOI":"10.1109\/WAINA.2015.34"},{"key":"2830_CR18","doi-asserted-by":"crossref","unstructured":"Ren, Y., Ding, N., Zhang, X. et al.: Verifiable outsourcing algorithms for modular exponentiations with improved checkability. In: Proceeding of the ACM ASIACCS, pp. 293\u2013303 (2016)","DOI":"10.1145\/2897845.2897881"},{"key":"2830_CR19","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-49890-4_5","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2016","author":"Lakshmi Kuppusamy","year":"2016","unstructured":"Kuppusamy, L., Rangasamy, J.: CRT-based outsourcing algorithms for modular exponentiations. In: Proceeding of the INDOCRYPT, pp. 81\u201398 (2016)"},{"issue":"2","key":"2830_CR20","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s10586-016-0571-z","volume":"19","author":"J Ye","year":"2016","unstructured":"Ye, J., Xu, Z., Ding, Y.: Secure outsourcing of modular exponentiations in cloud and cluster computing. Clust. Comput. 19(2), 811\u2013820 (2016)","journal-title":"Clust. Comput."},{"issue":"2","key":"2830_CR21","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s10623-005-3710-8","volume":"39","author":"MV Dijk","year":"2006","unstructured":"Dijk, M.V., Clarke, D., Gassend, B., et al.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253\u2013273 (2006)","journal-title":"Des. Codes Crypt."},{"key":"2830_CR22","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1007\/978-3-319-11203-9_19","volume-title":"Computer Security - ESORICS 2014","author":"Yujue Wang","year":"2014","unstructured":"Wang, Y., Wu, Q., Wong, D.S. et al.: Securely outsourcing exponentiations with single untrusted program for cloud storage. In: Proceeding of the ESORICS, pp. 326\u2013343 (2014)"},{"key":"2830_CR23","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1007\/978-3-319-45744-4_13","volume-title":"Computer Security \u2013 ESORICS 2016","author":"C\u00e9line Chevalier","year":"2016","unstructured":"Chevalier, C., Laguillaumie, F., Vergnaud, D.: Privately outsourcing exponentiation to a single server: cryptanalysis and optimal constructions. In: Proceeding of the ESORICS, pp. 261\u2013278 (2016)"},{"issue":"1","key":"2830_CR24","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s12652-014-0254-7","volume":"6","author":"C Xiang","year":"2015","unstructured":"Xiang, C., Tang, C.: Efficient outsourcing schemes of modular exponentiations with checkability for untrusted cloud server. J. Ambient Intell. Human. Comput. 6(1), 131\u2013139 (2015)","journal-title":"J. Ambient Intell. Human. Comput."},{"key":"2830_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jcss.2016.11.005","volume":"90","author":"Y Ding","year":"2016","unstructured":"Ding, Y., Xu, Z., Ye, J., et al.: Secure outsourcing of modular exponentiations under single untrusted programme model. J. Comput. Syst. Sci. 90, 1\u201313 (2016)","journal-title":"J. Comput. Syst. Sci."},{"issue":"5","key":"2830_CR26","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1007\/s10207-015-0308-7","volume":"15","author":"MS Kiraz","year":"2016","unstructured":"Kiraz, M.S., Uzunkol, O.: Efficient and Verifiable algorithms for secure outsourcing of cryptographic computations. Int. J. Inf. Secur. 15(5), 519\u2013537 (2016)","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"2830_CR27","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1016\/j.dcan.2017.05.001","volume":"3","author":"S Li","year":"2017","unstructured":"Li, S., Huang, L., Fu, A., et al.: CEXP: secure and verifiable outsourcing of composite modular exponentiation with single untrusted server. Digital Commun. Netw. 3(4), 236\u2013241 (2017)","journal-title":"Digital Commun. Netw."},{"issue":"4","key":"2830_CR28","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1007\/s10586-013-0252-0","volume":"16","author":"X Ma","year":"2013","unstructured":"Ma, X., Li, J., Zhang, F.: Outsourcing computation of modular exponentiations in cloud computing. Clust. Comput. 16(4), 787\u2013796 (2013)","journal-title":"Clust. Comput."},{"key":"2830_CR29","doi-asserted-by":"crossref","unstructured":"Li, J., Guan, Z., Du, X. et al.: An efficient encryption scheme with verifiable outsourced decryption in mobile cloud computing. In: Proceeding of the IEEE ICC, pp. 1\u20136 (2017)","DOI":"10.1109\/ICC.2017.7996492"},{"issue":"1","key":"2830_CR30","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/TIFS.2014.2363765","volume":"10","author":"X Chen","year":"2015","unstructured":"Chen, X., Huang, X., Li, J., et al.: New algorithms for secure outsourcing of large-scale systems of linear equations. IEEE Trans. Inf. Forensics Secur. 10(1), 69\u201378 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"8","key":"2830_CR31","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1109\/TPDS.2013.271","volume":"25","author":"J Li","year":"2014","unstructured":"Li, J., Huang, X., Li, J., et al.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201\u20132210 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"5","key":"2830_CR32","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MNET.2017.1600240","volume":"31","author":"J Wang","year":"2017","unstructured":"Wang, J., Hu, S., Wang, Q., et al.: Privacy-preserving outsourced feature extractions in the cloud: a survey. IEEE Netw. 31(5), 36\u201341 (2017)","journal-title":"IEEE Netw."},{"issue":"3","key":"2830_CR33","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/TPDS.2016.2598342","volume":"28","author":"G Xu","year":"2017","unstructured":"Xu, G., Amariucai, G.T., Guan, Y.: Delegation of computation with verification outsourcing: curious verifiers. IEEE Trans. Parallel Distrib. Syst. 28(3), 717\u2013730 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"2830_CR34","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1016\/j.future.2017.09.031","volume":"81","author":"L Zhou","year":"2017","unstructured":"Zhou, L., Zhu, Y., Choo, K.K.R.: Efficiently and securely harnessing cloud to solve linear regression and other matrix operations. Future Gener. Comput. Syst. 81, 404\u2013413 (2017)","journal-title":"Future Gener. Comput. Syst."},{"issue":"2","key":"2830_CR35","doi-asserted-by":"publisher","first-page":"989","DOI":"10.1007\/s10586-015-0444-x","volume":"18","author":"X Lei","year":"2015","unstructured":"Lei, X., Liao, X., Ma, X., et al.: Securely and efficiently perform large matrix rank decomposition computation via cloud computing. Clust. Comput. 18(2), 989\u2013997 (2015)","journal-title":"Clust. Comput."},{"key":"2830_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1133-8","author":"P Li","year":"2017","unstructured":"Li, P., Li, J., Huang, Z., et al.: Privacy-preserving outsourced classification in cloud computing. Clust. Comput. (2017). https:\/\/doi.org\/10.1007\/s10586-017-1133-8","journal-title":"Clust. Comput."},{"issue":"5","key":"2830_CR37","doi-asserted-by":"publisher","first-page":"2401","DOI":"10.1109\/TIFS.2016.2573770","volume":"8","author":"X Liu","year":"2016","unstructured":"Liu, X., Deng, R.H., Choo, K.K.R., et al.: An efficient privacy-preserving outsourced calculation toolkit with multiple keys. IEEE Trans. Inf. Forensics Secur. 8(5), 2401\u20132414 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2830_CR38","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2017.2687459","author":"H Wang","year":"2017","unstructured":"Wang, H., He, D., Han, J.: VOD-ADAC: anonymous distributed fine-grained access control protocol with verifiable outsourced decryption in public cloud. IEEE Trans. Serv. Comput. (2017). https:\/\/doi.org\/10.1109\/TSC.2017.2687459","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"6","key":"2830_CR39","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"4","key":"2830_CR40","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T Elgamal","year":"1985","unstructured":"Elgamal, T.: A publi-key cryptosystem and signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2830_CR41","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology \u2014 CRYPTO '98","author":"Ronald Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Proceeding of the CRYPTO, pp. 13\u201325 (1998)"},{"key":"2830_CR42","volume-title":"Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption","author":"W Ford","year":"2000","unstructured":"Ford, W., Baum, M.S.: Secure Electronic Commerce: Building the Infrastructure for Digital Signatures and Encryption. Prentice-Hall, Upper Saddle River (2000)"},{"issue":"5","key":"2830_CR43","first-page":"306","volume":"29","author":"H Wang","year":"2008","unstructured":"Wang, H., Xu, M., Guo, X.: Cryptanalysis and improvement of several certificateless digital signature schemes. J. Commun. 29(5), 306\u2013309 (2008)","journal-title":"J. Commun."},{"key":"2830_CR44","first-page":"239","volume":"435","author":"CP Schnorr","year":"1989","unstructured":"Schnorr, C.P.: Efficient identification and signatures for smart cards. Proc. CRYPTO 435, 239\u2013252 (1989)","journal-title":"Proc. CRYPTO"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2830-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2830-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2830-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T04:09:14Z","timestamp":1571630954000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2830-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,25]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["2830"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2830-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2018,7,25]]},"assertion":[{"value":"14 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}