{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:45:04Z","timestamp":1761709504400,"version":"3.41.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T00:00:00Z","timestamp":1532649600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Major Program of National Natural Science Foundation of China","award":["11290141"],"award-info":[{"award-number":["11290141"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1007\/s11042-018-6330-9","type":"journal-article","created":{"date-parts":[[2018,7,27]],"date-time":"2018-07-27T11:04:42Z","timestamp":1532689482000},"page":"3511-3528","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Lattice based signature with outsourced revocation for Multimedia Social Networks in cloud computing"],"prefix":"10.1007","volume":"78","author":[{"given":"Faguo","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"6330_CR1","unstructured":"Ajtai M (1996) Generating hard instances of lattice problems. In: 28th ACM symposium on theory of computing, pp 99\u2013108"},{"issue":"3","key":"6330_CR2","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/s00224-010-9278-3","volume":"48","author":"J Alwen","year":"2011","unstructured":"Alwen J, Peikert C (2011) Generating shorter bases for hard random lattices. Theory Comput Syst 48(3):535","journal-title":"Theory Comput Syst"},{"issue":"3","key":"6330_CR3","first-page":"35","volume":"5","author":"MA Alzain","year":"2015","unstructured":"Alzain MA, Li AS, Soh B, Pardede E (2015) Multi-cloud data management using Shamir\u2019s secret sharing and quantum byzantine agreement schemes. Int J Cloud Appl Comput 5(3):35","journal-title":"Int J Cloud Appl Comput"},{"issue":"18","key":"6330_CR4","doi-asserted-by":"publisher","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","volume":"76","author":"S Atawneh","year":"2017","unstructured":"Atawneh S, Almomani A, Bazar HA, Sumari P, Gupta B (2017) Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain. Multimed Tools Appl 76(18):18451","journal-title":"Multimed Tools Appl"},{"key":"6330_CR5","doi-asserted-by":"crossref","unstructured":"Boldyreva A, Goyal V, Kumar V (2008) Identity-based encryption with efficient revocation. In: ACM conference on computer and communications security, pp 417\u2013426","DOI":"10.1145\/1455770.1455823"},{"issue":"3","key":"6330_CR6","first-page":"213","volume":"32","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M (2001) Identity based encryption from the Weil pairing. Grypto 32(3):213","journal-title":"Grypto"},{"key":"6330_CR7","volume-title":"Identity-Based encryption from the weil pairing","author":"B Dan","year":"2003","unstructured":"Dan B, Franklin M (2003) Identity-Based encryption from the weil pairing. Society for Industrial and Applied Mathematics, Philadelphia"},{"key":"6330_CR8","unstructured":"Feng B, Liu J (2017) Practical Identity-based authentication protocol for ad-hoc networks. In: IEEE international conference on software engineering and service science"},{"issue":"6","key":"6330_CR9","first-page":"1143","volume":"18","author":"Y Gao","year":"2016","unstructured":"Gao Y, Zeng P, Choo KKR, Song F (2016) An improved online\/offline identity-based signature scheme for WSNs. Int J Netw Secur 18(6):1143","journal-title":"Int J Netw Secur"},{"key":"6330_CR10","doi-asserted-by":"crossref","unstructured":"Gentry C, Peikert C, Vaikuntanathan V (2008) Trapdoors for hard lattices and new cryptographic constructions, pp 197\u2013206","DOI":"10.1145\/1374376.1374407"},{"key":"6330_CR11","first-page":"1","volume":"77","author":"S Gupta","year":"2016","unstructured":"Gupta S, Gupta BB (2016) XSS-Secure as a service for the platforms of online social network-based multimedia web applications in cloud. Multimed Tools Appl 77:1\u201333","journal-title":"Multimed Tools Appl"},{"key":"6330_CR12","doi-asserted-by":"crossref","unstructured":"Gupta B, Agrawal DP, Yamaguchi S (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global","DOI":"10.4018\/978-1-5225-0105-3"},{"key":"6330_CR13","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2016.09.049","volume":"375","author":"D He","year":"2017","unstructured":"He D, Wang H, Zhang J, Wang L (2017) Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage. Inf Sci 375:48","journal-title":"Inf Sci"},{"issue":"10","key":"6330_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2017\/7571201","volume":"2017","author":"YH Hung","year":"2017","unstructured":"Hung YH, Tseng YM, Huang SS (2017) Revocable ID-based signature with short size over lattices. Security and Communication Networks 2017(10):1","journal-title":"Security and Communication Networks"},{"issue":"3","key":"6330_CR15","first-page":"1","volume":"2017","author":"Y Jararweh","year":"2017","unstructured":"Jararweh Y, Al-Ayyoub M, Fakirah M, Alawneh L, Gupta BB (2017) Improving the performance of the needleman-wunsch algorithm using parallelization and vectorization techniques. Multimed Tools Appl 2017(3):1","journal-title":"Multimed Tools Appl"},{"issue":"99","key":"6330_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ACCESS.2017.2681115","volume":"PP","author":"X Jia","year":"2017","unstructured":"Jia X, He D, Zeadally S, Li L (2017) Efficient revocable ID-based signature with cloud revocation server. IEEE Access PP(99):1","journal-title":"IEEE Access"},{"issue":"2","key":"6330_CR17","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TC.2013.208","volume":"64","author":"J Li","year":"2015","unstructured":"Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425","journal-title":"IEEE Trans Comput"},{"key":"6330_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12243-017-0574-7","volume":"72","author":"Y Lu","year":"2017","unstructured":"Lu Y, Wang G, Li J, Shen J (2017) Efficient designated server identity-based encryption with conjunctive keyword search. Ann Telecommun 72:1\u201312","journal-title":"Ann Telecommun"},{"key":"6330_CR19","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V (2012) Lattice signatures without trapdoors. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, New York, pp 738\u2013755","DOI":"10.1007\/978-3-642-29011-4_43"},{"key":"6330_CR20","doi-asserted-by":"crossref","unstructured":"Micciancio D, Regev O (2004) Worst-case to average-case reductions based on Gaussian measures. In: IEEE symposium on foundations of computer science, pp 372\u2013381","DOI":"10.1109\/FOCS.2004.72"},{"key":"6330_CR21","volume-title":"Identity-based cryptosystems and signature schemes","author":"A Shamir","year":"1984","unstructured":"Shamir A (1984) Identity-based cryptosystems and signature schemes. Springer, Berlin"},{"key":"6330_CR22","doi-asserted-by":"crossref","unstructured":"Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Quantum entanglement and quantum information\u2013proceedings of ccast, pp 303\u2013332","DOI":"10.1137\/S0036144598347011"},{"key":"6330_CR23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_26","volume-title":"Efficient identity-based signature from lattices","author":"M Tian","year":"2014","unstructured":"Tian M, Huang L (2014) Efficient identity-based signature from lattices. Springer, Berlin"},{"issue":"1","key":"6330_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1504\/IJESDF.2013.054403","volume":"5","author":"M Tian","year":"2013","unstructured":"Tian M, Huang L, Yang W (2013) Efficient hierarchical identity-based signatures from lattices. Int J Electron Secur Digit Forens 5(1):1","journal-title":"Int J Electron Secur Digit Forens"},{"key":"6330_CR25","unstructured":"Tseng YM, Tsai TT, Huang SS, Huang CP (2016) Identity-based encryption with cloud revocation authority and its applications. In: IEEE transactions on cloud computing, pp 1\u20131"},{"issue":"99","key":"6330_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCC.2017.2662226","volume":"PP","author":"YM Tseng","year":"2017","unstructured":"Tseng YM, Tsai TT, Huang SS, Huang CP (2017) Identity-based encryption with cloud revocation authority and its applications. IEEE Trans Cloud Comput PP (99):1","journal-title":"IEEE Trans Cloud Comput"},{"issue":"99","key":"6330_CR27","first-page":"1","volume":"PP","author":"Z Wang","year":"2017","unstructured":"Wang Z (2017) An identity-based data aggregation protocol for the smart grid. IEEE Trans Ind Inf PP(99):1","journal-title":"IEEE Trans Ind Inf"},{"key":"6330_CR28","doi-asserted-by":"publisher","DOI":"10.1080\/00207160.2015.1029464","volume-title":"Full secure identity-based encryption scheme with short public key size over lattices in the standard model","author":"F Wang","year":"2016","unstructured":"Wang F, Liu ZH, Wang C (2016) Full secure identity-based encryption scheme with short public key size over lattices in the standard model. Taylor & Francis, New York"},{"issue":"99","key":"6330_CR29","doi-asserted-by":"publisher","first-page":"16314","DOI":"10.1109\/ACCESS.2017.2737957","volume":"5","author":"Z Wei","year":"2017","unstructured":"Wei Z, Yang Y, Wu Y, Weng J, Deng RH (2017) HIBS-KS haring: hierarchical identity-based signature key sharing for automotive. IEEE Access 5(99):16314","journal-title":"IEEE Access"},{"issue":"10","key":"6330_CR30","first-page":"126","volume":"41","author":"X Xiang","year":"2015","unstructured":"Xiang X (2015) Adaptive secure revocable identity-based signature scheme over lattices. Comput Eng 41(10):126","journal-title":"Comput Eng"},{"key":"6330_CR31","first-page":"025","volume":"10","author":"X Xinyin","year":"2015","unstructured":"Xinyin X (2015) Adaptive secure revocable identity-based signature scheme over lattices. Comput Eng 10:025","journal-title":"Comput Eng"},{"key":"6330_CR32","first-page":"58","volume":"36","author":"ZY Zhang","year":"2009","unstructured":"Zhang ZY, Pei QQ, Yang L, Ma JF (2009) Attestation proxy party-supported remote attestation model and its secure protocol. J Xidian Univ 36:58\u201363","journal-title":"J Xidian Univ"},{"issue":"4","key":"6330_CR33","doi-asserted-by":"crossref","first-page":"827","DOI":"10.23919\/CJE.2014.10851993","volume":"23","author":"Q Zhang","year":"2014","unstructured":"Zhang Q, Zhang Q, Zhongmei MA, Tan Y (2014) An authenticated asymmetric group key agreement for imbalanced mobile networks. Chin J Electron 23(4):827","journal-title":"Chin J Electron"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6330-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6330-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6330-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T02:18:08Z","timestamp":1751768288000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6330-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,27]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,2]]}},"alternative-id":["6330"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6330-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"type":"print","value":"1380-7501"},{"type":"electronic","value":"1573-7721"}],"subject":[],"published":{"date-parts":[[2018,7,27]]},"assertion":[{"value":"23 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 June 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}