{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T22:36:05Z","timestamp":1774650965170,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,7,8]],"date-time":"2018-07-08T00:00:00Z","timestamp":1531008000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11036-018-1095-y","type":"journal-article","created":{"date-parts":[[2018,7,8]],"date-time":"2018-07-08T02:04:24Z","timestamp":1531015464000},"page":"434-442","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Efficient Secure Aggregation in VANETs Using Fully Homomorphic Encryption (FHE)"],"prefix":"10.1007","volume":"24","author":[{"given":"N. K.","family":"Prema","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,8]]},"reference":[{"key":"1095_CR1","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.procs.2016.07.393","volume":"92","author":"G Dhand","year":"2016","unstructured":"Dhand G, Tyagi SS (2016) Data aggregation techniques in WSN: survey. Procedia Computer Science 92:378\u2013384","journal-title":"Procedia Computer Science"},{"key":"1095_CR2","doi-asserted-by":"crossref","unstructured":"Tonyali S, Akkaya K, Saputro N, Uluagac AS, Nojoumian M (2017) Privacy-preserving protocols for secure and reliable data aggregation in IoT-enabled Smart Metering systems. Future Generation Computer Systems","DOI":"10.1016\/j.future.2017.04.031"},{"key":"1095_CR3","doi-asserted-by":"crossref","unstructured":"Raya M, Aziz A, Hubaux JP (2006, September) Efficient secure aggregation in VANETs. In Proceedings of the 3rd international workshop on vehicular ad hoc networks. ACM, New York, pp 67\u201375","DOI":"10.1145\/1161064.1161076"},{"key":"1095_CR4","doi-asserted-by":"crossref","unstructured":"Hariss K, Noura H, Samhat AE (2017) Fully enhanced homomorphic encryption algorithm of MORE approach for real world applications. Journal of Information Security and Applications 34:233\u2013242","DOI":"10.1016\/j.jisa.2017.02.001"},{"key":"1095_CR5","doi-asserted-by":"publisher","unstructured":"Goyal N, Dave M, Verma AK (2017) Data aggregation in underwater wireless sensor network: recent approaches and issues. Journal of King Saud University-Computer and Information Sciences. \n                    https:\/\/doi.org\/10.1016\/j.jksuci.2017.04.007","DOI":"10.1016\/j.jksuci.2017.04.007"},{"issue":"15","key":"1095_CR6","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1002\/sec.1211","volume":"9","author":"J Song","year":"2016","unstructured":"Song J, He C, Yang F, Zhang H (2016) A privacy-preserving distance-based incentive scheme in opportunistic VANETs. Security and Communication Networks 9(15):2789\u20132801","journal-title":"Security and Communication Networks"},{"key":"1095_CR7","doi-asserted-by":"crossref","unstructured":"Stehl\u00e9 D, Steinfeld R (2010) Faster fully homomorphic encryption. Advances in Cryptology-ASIACRYPT 2010, pp. 377\u2013394","DOI":"10.1007\/978-3-642-17373-8_22"},{"key":"1095_CR8","doi-asserted-by":"crossref","unstructured":"Coron JS, Mandal A, Naccache D, Tibouchi M (2011). Fully Homomorphic Encryption over the Integers with Shorter Public Keys. In Crypto Vol. 6841, pp. 487\u2013504","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"1095_CR9","doi-asserted-by":"crossref","unstructured":"Coron JS, Naccache D, Tibouchi M (2012). Public Key Compression and Modulus Switching for Fully Homomorphic Encryption over the Integers. In EUROCRYPT (Vol. 7237, pp. 446\u2013464)","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"1095_CR10","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S (2011) Implementing Gentry's Fully-Homomorphic Encryption Scheme. In EUROCRYPT (Vol. 6632, pp. 129\u2013148)","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"1095_CR11","doi-asserted-by":"crossref","unstructured":"Gentry C, Halevi S, Smart NP (2012) Fully homomorphic encryption with polylog overhead. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 465\u2013482). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"1095_CR12","doi-asserted-by":"crossref","unstructured":"Chen Y, Nguyen PQ (2012) Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers. In EUROCRYPT (Vol. 7237, pp. 502\u2013519)","DOI":"10.1007\/978-3-642-29011-4_30"},{"key":"1095_CR13","unstructured":"Fan J, Vercauteren F (2012) Somewhat Practical Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, 2012, p.144"},{"key":"1095_CR14","first-page":"1","volume":"2012","author":"C Gentry","year":"2012","unstructured":"Gentry C, Halevi S, Smart N (2012) Better bootstrapping in fully homomorphic encryption. Public Key Cryptography\u2013PKC 2012:1\u201316","journal-title":"Public Key Cryptography\u2013PKC"},{"key":"1095_CR15","doi-asserted-by":"crossref","unstructured":"Fau S, Sirdey R, Fontaine C, Aguilar-Melchor C, Gogniat G (2013), Towards practical program execution over fully homomorphic encryption schemes. In P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2013 Eighth International Conference on (pp. 284\u2013290). IEEE","DOI":"10.1109\/3PGCIC.2013.48"},{"issue":"3","key":"1095_CR16","first-page":"13","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Gentry C, Vaikuntanathan V (2014) (leveled) fully homomorphic encryption without bootstrapping. ACM Transactions on Computation Theory (TOCT) 6(3):13","journal-title":"ACM Transactions on Computation Theory (TOCT)"},{"issue":"2","key":"1095_CR17","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski Z, Vaikuntanathan V (2014) Efficient fully homomorphic encryption from (standard) LWE. SIAM J Comput 43(2):831\u2013871","journal-title":"SIAM J Comput"},{"key":"1095_CR18","doi-asserted-by":"crossref","unstructured":"Boneh D, Gentry C, Gorbunov S, Halevi S, Nikolaenko V, Segev G, Vaikuntanathan V, Vinayagamurthy D (2014). Fully key-homomorphic encryption, arithmetic circuit ABE and compact garbled circuits. In Annual International Conference on the Theory and Applications of Cryptographic Techniques (pp. 533\u2013556). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-55220-5_30"},{"issue":"3","key":"1095_CR19","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1109\/TC.2013.154","volume":"64","author":"W Wang","year":"2015","unstructured":"Wang W, Hu Y, Chen L, Huang X, Sunar B (2015) Exploring the feasibility of fully homomorphic encryption. IEEE Trans Comput 64(3):698\u2013706","journal-title":"IEEE Trans Comput"},{"key":"1095_CR20","unstructured":"Jain A, Rasmussen PM, Sahai A (2017) Threshold Fully Homomorphic Encryption. IACR Cryptology ePrint Archive, 2017, p.257"},{"key":"1095_CR21","doi-asserted-by":"crossref","unstructured":"Canetti R, Raghuraman S, Richelson S, Vaikuntanathan V (2017). Chosen-Ciphertext Secure Fully Homomorphic Encryption. In IACR International Workshop on Public Key Cryptography (pp. 213\u2013240). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-662-54388-7_8"},{"key":"1095_CR22","doi-asserted-by":"crossref","unstructured":"Kogos KG, Filippova KS, Epishkina AV (2017), Fully homomorphic encryption schemes: The state of the art. In Young Researchers in Electrical and Electronic Engineering (EIConRus), 2017 IEEE Conference of Russian (pp. 463\u2013466). IEEE","DOI":"10.1109\/EIConRus.2017.7910591"},{"key":"1095_CR23","unstructured":"Tamayo-Rios M, Faug\u00e8re JC, Perret L, Ho, PH, Zhang R (2017). Fully Homomorphic Encryption Using Multivariate Polynomials. IACR Eprint, 458"},{"key":"1095_CR24","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.ins.2017.05.004","volume":"409","author":"W Ding","year":"2017","unstructured":"Ding W, Yan Z, Deng RH (2017) Encrypted data processing with homomorphic re-encryption. Inf Sci 409:35\u201355","journal-title":"Inf Sci"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1095-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-018-1095-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-018-1095-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,7]],"date-time":"2019-07-07T19:09:30Z","timestamp":1562526570000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-018-1095-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,8]]},"references-count":24,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["1095"],"URL":"https:\/\/doi.org\/10.1007\/s11036-018-1095-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"value":"1383-469X","type":"print"},{"value":"1572-8153","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,8]]},"assertion":[{"value":"8 July 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}