{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T21:10:18Z","timestamp":1758057018999,"version":"3.44.0"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T00:00:00Z","timestamp":1755561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1007\/s10586-025-05224-0","type":"journal-article","created":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T11:36:38Z","timestamp":1755603398000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An OTP and watermarking based partial homomorphic approach to authenticated and integrated cloud computing"],"prefix":"10.1007","volume":"28","author":[{"given":"Muath","family":"AlShaikh","sequence":"first","affiliation":[]},{"given":"Mostefa","family":"Kara","sequence":"additional","affiliation":[]},{"given":"Farid","family":"Binbeshr","sequence":"additional","affiliation":[]},{"given":"Mustafa","family":"Ghaleb","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,19]]},"reference":[{"key":"5224_CR1","first-page":"108","volume":"1","author":"T Alam","year":"2021","unstructured":"Alam, T.: Cloud computing and its role in the information technology. IAIC Trans. Sustain. Digit. Innov. 1, 108\u2013115 (2021)","journal-title":"IAIC Trans. Sustain. Digit. Innov."},{"issue":"2","key":"5224_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.48161\/qaj.v1n2a36","volume":"1","author":"MM Sadeeq","year":"2021","unstructured":"Sadeeq, M.M., et al.: IoT and cloud computing issues, challenges and opportunities: a review. Qubahan Acad. J. 1(2), 1\u20137 (2021)","journal-title":"Qubahan Acad. J."},{"key":"5224_CR3","doi-asserted-by":"crossref","unstructured":"Hayes, B.: Cloud computing. Commun. ACM, 9\u201311 (2008)","DOI":"10.1145\/1364782.1364786"},{"issue":"1","key":"5224_CR4","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1186\/s42400-023-00168-7","volume":"6","author":"W-T Song","year":"2023","unstructured":"Song, W.-T., Zeng, G., Zhang, W.-Z., Tang, D.-h: Research on privacy information retrieval model based on hybrid homomorphic encryption. Cybersecurity 6(1), 31 (2023)","journal-title":"Cybersecurity"},{"key":"5224_CR5","doi-asserted-by":"crossref","unstructured":"Jung, W., et al.: Over 100x faster bootstrapping in fully homomorphic encryption through memory-centric optimization with GPUS. IACR Cryptol. ePrint Arch., 508 (2021)","DOI":"10.46586\/tches.v2021.i4.114-148"},{"key":"5224_CR6","doi-asserted-by":"crossref","unstructured":"Meftah, S., et al.: Doren: towards efficient deep convolutional neural networks with fully homomorphic encryption. IEEE Trans. Inf. Forensics Secur. (2021)","DOI":"10.1109\/TIFS.2021.3090959"},{"issue":"2","key":"5224_CR7","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"4","key":"5224_CR8","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469\u2013472 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5224_CR9","unstructured":"Benaloh, J.: Dense probabilistic encryption. In: Proceedings of the Workshop on Selected Areas of Cryptography (1994)"},{"key":"5224_CR10","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin, Heidelberg (1999)"},{"key":"5224_CR11","unstructured":"Boer, D., Kramer, S.: Secure sum outperforms homomorphic encryption in (current) collaborative deep learning. arXiv preprint arXiv:2006.02894 (2020)"},{"key":"5224_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-32115-8","volume-title":"Homomorphic Signature Schemes: A Survey","author":"G Traverso","year":"2016","unstructured":"Traverso, G., Demirel, D., Buchmann, J.: Homomorphic Signature Schemes: A Survey, vol. 1. Springer (2016)"},{"key":"5224_CR13","doi-asserted-by":"crossref","unstructured":"AlShaikh, M., et al.: Robust and imperceptible medical image watermarking based on dijkstra algorithm. In: Proceedings of the 3rd International Conference on Future Networks and Distributed Systems (2019)","DOI":"10.1145\/3341325.3341991"},{"key":"5224_CR14","doi-asserted-by":"crossref","unstructured":"Saha, A., Sinha\u00a0Roy, S., Basu, A., et al.: On unique framework-based implementation of a novel image watermarking scheme. Multimedia Tools App., 1\u201318 (2024)","DOI":"10.1007\/s11042-024-18436-0"},{"key":"5224_CR15","first-page":"160","volume":"82","author":"AC-C Yao","year":"1982","unstructured":"Yao, A.C.-C.: Protocols for secure computations. FOCS 82, 160\u2013164 (1982)","journal-title":"FOCS"},{"key":"5224_CR16","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"5224_CR17","volume-title":"Annual Cryptology Conference","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Toward basing fully homomorphic encryption on worst-case hardness. In: Annual Cryptology Conference. Springer, Berlin, Heidelberg (2010)"},{"key":"5224_CR18","volume-title":"International Workshop on Public Key Cryptography","author":"I Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (2001)"},{"key":"5224_CR19","volume-title":"International Workshop on Public Key Cryptography","author":"A Kawachi","year":"2007","unstructured":"Kawachi, A., Tanaka, K., Xagawa, K.: Multi-bit cryptosystems based on lattice problems. In: International Workshop on Public Key Cryptography. Springer, Berlin, Heidelberg (2007)"},{"issue":"2","key":"5224_CR20","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s00145-001-0015-6","volume":"15","author":"SD Galbraith","year":"2002","unstructured":"Galbraith, S.D.: Elliptic curve Paillier schemes. J. Cryptol. 15(2), 129\u2013138 (2002)","journal-title":"J. Cryptol."},{"key":"5224_CR21","doi-asserted-by":"crossref","unstructured":"Kebache, R., Laouid, A., Bounceur, A., et al.: Reducing the encrypted data size: Healthcare with IoT-cloud computing applications. Comput. Syst. Sci. Eng. 48(4) (2024)","DOI":"10.32604\/csse.2024.048738"},{"key":"5224_CR22","doi-asserted-by":"crossref","unstructured":"AlShaikh, M., Alzaqebah, M., Gmati, N., et al.: Image encryption algorithm based on factorial decomposition. Multimedia Tools App., 1\u201321 (2024)","DOI":"10.1007\/s11042-023-17663-1"},{"key":"5224_CR23","doi-asserted-by":"crossref","unstructured":"Wu, T., Zhao, C., Zhang, Y.-J.A.: Privacy-preserving distributed optimal power flow with partially homomorphic encryption. IEEE Trans. Smart Grid (2021)","DOI":"10.1109\/TSG.2021.3084934"},{"key":"5224_CR24","doi-asserted-by":"crossref","unstructured":"Medileh, S., Kara, M., Laouid, A., et al.: A secure clock synchronization scheme in WSNs adapted for IoT-based applications. In: Proceedings of the 7th International Conference on Future Networks and Distributed Systems, pp. 674\u2013681 (2023)","DOI":"10.1145\/3644713.3644826"},{"issue":"8","key":"5224_CR25","doi-asserted-by":"publisher","first-page":"6324","DOI":"10.1109\/JIOT.2020.3015032","volume":"8","author":"X Jin","year":"2020","unstructured":"Jin, X., et al.: Confused-modulo-projection-based somewhat homomorphic encryption-cryptosystem, library, and applications on secure smart cities. IEEE Internet Things J. 8(8), 6324\u20136336 (2020)","journal-title":"IEEE Internet Things J."},{"key":"5224_CR26","volume-title":"European Symposium on Research in Computer Security","author":"J Park","year":"2020","unstructured":"Park, J., Tibouchi, M.: Shecs-pir: somewhat homomorphic encryption-based compact and scalable private information retrieval. In: European Symposium on Research in Computer Security. Springer, Cham (2020)"},{"issue":"2","key":"5224_CR27","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) LWE. SIAM J. Comput. 43(2), 831\u2013871 (2014)","journal-title":"SIAM J. Comput."},{"key":"5224_CR28","doi-asserted-by":"crossref","unstructured":"Saber, M., El-Kenawy, E.-S.M., Ibrahim, A., et al.: Watermarking system for medical images using optimization algorithm. Fusion: Practice App. 10(1) (2023)","DOI":"10.54216\/FPA.100105"},{"key":"5224_CR29","doi-asserted-by":"publisher","first-page":"101723","DOI":"10.1016\/j.swevo.2024.101723","volume":"91","author":"NA Azam","year":"2024","unstructured":"Azam, N.A., Haider, T., Hayat, U.: An optimized watermarking scheme based on genetic algorithm and elliptic curve. Swarm Evol. Comput. 91, 101723 (2024)","journal-title":"Swarm Evol. Comput."},{"key":"5224_CR30","doi-asserted-by":"crossref","unstructured":"Melman, A., Evsutin, O.: Methods for countering attacks on image watermarking schemes: overview. J. Visual Commun. Image Representation, 104073 (2024)","DOI":"10.1016\/j.jvcir.2024.104073"},{"key":"5224_CR31","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-40041-4_5","volume-title":"Advances in Cryptology-CRYPTO 2013","author":"C Gentry","year":"2013","unstructured":"Gentry, C., Sahai, A., Waters, B.: Homomorphic encryption from learning with errors: conceptually-simpler, asymptotically-faster, attribute-based. In: Advances in Cryptology-CRYPTO 2013, pp. 75\u201392. Springer, Berlin, Heidelberg (2013)"},{"issue":"3","key":"5224_CR32","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1109\/TC.2013.154","volume":"64","author":"W Wang","year":"2015","unstructured":"Wang, W., et al.: Exploring the feasibility of fully homomorphic encryption. IEEE Trans. Comput. 64(3), 698\u2013706 (2015)","journal-title":"IEEE Trans. Comput."},{"key":"5224_CR33","doi-asserted-by":"publisher","first-page":"24325","DOI":"10.1109\/ACCESS.2018.2819189","volume":"6","author":"JH Cheon","year":"2018","unstructured":"Cheon, J.H., et al.: Toward a secure drone system: flying with real-time homomorphic authenticated encryption. IEEE Access 6, 24325\u201324339 (2018)","journal-title":"IEEE Access"},{"key":"5224_CR34","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.ins.2017.09.012","volume":"422","author":"J Kim","year":"2018","unstructured":"Kim, J., Kim, S., Seo, J.H.: A new scale-invariant homomorphic encryption scheme. Inf. Sci. 422, 177\u2013187 (2018)","journal-title":"Inf. Sci."},{"key":"5224_CR35","doi-asserted-by":"crossref","unstructured":"Liang, W., et al.: Circuit copyright blockchain: Blockchain-based homomorphic encryption for ip circuit protection. IEEE Trans. Emerg. Topics Comput. (2020)","DOI":"10.1109\/TETC.2020.2993032"},{"key":"5224_CR36","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s11045-020-00732-1","volume":"32","author":"P Khare","year":"2021","unstructured":"Khare, P., Srivastava, V.K.: A reliable and secure image watermarking algorithm using homomorphic transform in dwt domain. Multidimension. Syst. Signal Process. 32, 131\u2013160 (2021)","journal-title":"Multidimension. Syst. Signal Process."},{"issue":"12","key":"5224_CR37","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.9717\/kmms.2014.17.12.1402","volume":"17","author":"T-Y Seong","year":"2014","unstructured":"Seong, T.-Y., Kwon, K.-C., Lee, S.-H., Moon, K.-S., Kwon, K.-R.: DCT and homomorphic encryption based watermarking scheme in buyer-seller watermarking protocol. J. Korea Multimedia Soc. 17(12), 1402\u20131411 (2014)","journal-title":"J. Korea Multimedia Soc."},{"key":"5224_CR38","unstructured":"Nazari, H., Bidgoli, M.M., Ghasvari, H.: Integrating encryption and watermarking for enhanced information transmission security. Majlesi J. Electric. Eng. 18(2) (2024)"},{"issue":"6","key":"5224_CR39","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1016\/j.ipm.2014.07.001","volume":"50","author":"HA Abdallah","year":"2014","unstructured":"Abdallah, H.A., Ghazy, R.A., Kasban, H., Faragallah, O.S., Shaalan, A.A., Hadhoud, M.M., Dessouky, M.I., El-Fishawy, N.A., Alshebeili, S.A., Abd El-samie, F.E.: Homomorphic image watermarking with a singular value decomposition algorithm. Inf. Process. Manage. 50(6), 909\u2013923 (2014)","journal-title":"Inf. Process. Manage."},{"key":"5224_CR40","unstructured":"Hofheinz, D., M\u00fcller-Quade, J., Steinwandt, R.: On modeling IND-CCA security in cryptographic protocols. Cryptology ePrint Archive (2003)"},{"key":"5224_CR41","first-page":"422","volume-title":"Annual International Cryptology Conference","author":"G Persiano","year":"2024","unstructured":"Persiano, G., Phan, D.H., Yung, M.: Public-key anamorphism in (CCA-secure) public-key encryption and beyond. In: Annual International Cryptology Conference, pp. 422\u2013455. Springer (2024)"},{"issue":"8","key":"5224_CR42","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1093\/comjnl\/bxx017","volume":"60","author":"Y Zhou","year":"2017","unstructured":"Zhou, Y., Yang, B.: Continuous leakage-resilient public-key encryption scheme with CCA security. Comput. J. 60(8), 1161\u20131172 (2017)","journal-title":"Comput. J."},{"key":"5224_CR43","unstructured":"Loftus, J., May, A., Smart, N.P., Vercauteren, F.: On CCA-secure fully homomorphic encryption. Cryptology ePrint Archive (2010)"},{"key":"5224_CR44","doi-asserted-by":"crossref","unstructured":"Pang, H., Wang, B.: Privacy-preserving association rule mining using homomorphic encryption in a multikey environment. IEEE Syst. J. (2020)","DOI":"10.1109\/JSYST.2020.3001316"},{"issue":"2","key":"5224_CR45","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1007\/s10586-017-1368-4","volume":"21","author":"M Thangavel","year":"2018","unstructured":"Thangavel, M., Varalakshmi, P.: Enhanced DNA and Elgamal cryptosystem for secure data storage and retrieval in cloud. Clust. Comput. 21(2), 1411\u20131437 (2018)","journal-title":"Clust. Comput."},{"key":"5224_CR46","first-page":"1","volume-title":"2012 IEEE Conference on High Performance Extreme Computing","author":"W Wang","year":"2012","unstructured":"Wang, W., Hu, Y., Chen, L., Huang, X., Sunar, B.: Accelerating fully homomorphic encryption using GPU. In: 2012 IEEE Conference on High Performance Extreme Computing, pp. 1\u20135. IEEE (2012)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05224-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05224-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05224-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,15]],"date-time":"2025-09-15T19:07:10Z","timestamp":1757963230000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05224-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,19]]},"references-count":46,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["5224"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05224-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2025,8,19]]},"assertion":[{"value":"19 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 February 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"520"}}