{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T05:20:22Z","timestamp":1761110422187,"version":"3.37.3"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,11,27]],"date-time":"2018-11-27T00:00:00Z","timestamp":1543276800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11277-018-6083-9","type":"journal-article","created":{"date-parts":[[2018,11,27]],"date-time":"2018-11-27T02:44:09Z","timestamp":1543286649000},"page":"599-618","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["A Design of Secure Communication Protocol Using RLWE-Based Homomorphic Encryption in IoT Convergence Cloud Environment"],"prefix":"10.1007","volume":"105","author":[{"given":"Byung-Wook","family":"Jin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5478-0394","authenticated-orcid":false,"given":"Jung-Oh","family":"Park","sequence":"additional","affiliation":[]},{"given":"Hyung-Jin","family":"Mun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,27]]},"reference":[{"key":"6083_CR1","unstructured":"Park, J. (2014). Future of Internet of Things (1st ed.). ETNEWS."},{"issue":"5","key":"6083_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.5392\/JKCA.2016.16.05.001","volume":"16","author":"Kyung Choi","year":"2016","unstructured":"Choi, Kyung, & Kim, Mi-Hui. (2016). Reseach on convergence of internet-of-things and cloud computing. JKCA, 16(5), 1\u201312.","journal-title":"JKCA"},{"key":"6083_CR3","doi-asserted-by":"crossref","unstructured":"Nam, H.-J. (2017). Security and privacy issues of fog computing. KICIS, 1(42).","DOI":"10.7840\/kics.2017.42.1.257"},{"issue":"8","key":"6083_CR4","first-page":"3","volume":"30","author":"CS Pyo","year":"2013","unstructured":"Pyo, C. S., Kang, H. Y., Kim, N. S., & Bang, H. C. (2013). Trends and development prospects of IoT(M2M). The Journal of Korean Institute of Communication and Information Sciences, 30(8), 3\u20138.","journal-title":"The Journal of Korean Institute of Communication and Information Sciences"},{"key":"6083_CR5","unstructured":"Gentry, C. (2009). A fully homomorphic encryption scheme. Stanford University, Ph.D. Thesis."},{"key":"6083_CR6","unstructured":"Cha, H.-J. (2015). Design of the secure data management system using homomorphic encryption. KICTS, 4(15)."},{"key":"6083_CR7","doi-asserted-by":"crossref","unstructured":"Gentry, C., & Halevi, S. (2011). Implementing gentry\u2019s fully homomorphic encryption scheme. In Advances in Cryptology \u2013EUROCRYPT, Lecture Notes in Computer Science (Vol. 6632, pp. 129\u2013148).","DOI":"10.1007\/978-3-642-20465-4_9"},{"issue":"38","key":"6083_CR8","doi-asserted-by":"publisher","first-page":"428","DOI":"10.7840\/kics.2013.38C.5.428","volume":"5","author":"J-H Kim","year":"2013","unstructured":"Kim, J.-H. (2013). Fully homomorphic encryption scheme without key. FHE, KICS, 5(38), 428\u2013433.","journal-title":"FHE, KICS"},{"issue":"5","key":"6083_CR9","doi-asserted-by":"publisher","first-page":"428","DOI":"10.7840\/kics.2013.38C.5.428","volume":"38","author":"J-H Kim","year":"2013","unstructured":"Kim, J.-H., You, S.-K., & Lee, S.-H. (2013). Fully homomorphic encryption scheme without key switching. KICS, 38(5), 428\u2013433.","journal-title":"KICS"},{"key":"6083_CR10","unstructured":"Yang, H., Kim, H., Tang, D., & Li, H. An Efficient Somewhat HE scheme over Integers and Its Variation. IETE Technical Review."},{"issue":"3","key":"6083_CR11","first-page":"80","volume":"19","author":"Y-J Song","year":"2009","unstructured":"Song, Y.-J., & Park, K.-Y. (2009). Homomorphic encryption technique for database outsourcing. KIISC, 19(3), 80\u201389.","journal-title":"KIISC"},{"key":"6083_CR12","unstructured":"Brakerski, Z., Gentry, C., & Vaikuntanathan, V. (2011). Fully homomorphic encryption without bootstrapping. IACR Eprint Archive."},{"key":"6083_CR13","unstructured":"Yang, H., & Kim, H. (2013). A fully homomorphic encryption scheme based on somewhat homomorphic encryption scheme with two integers. In Proceedings of KICS winter conference 2013 (pp. 76\u201377)."},{"issue":"10","key":"6083_CR14","first-page":"2217","volume":"16","author":"S-J Kim","year":"2012","unstructured":"Kim, S.-J., Kim, J.-M., & Cho, I.-J. (2012). Design of configuration management using homomorphic encryption in mobile cloud service. KIICE, 16(10), 2217\u20132223.","journal-title":"KIICE"},{"issue":"2","key":"6083_CR15","first-page":"213","volume":"10","author":"H-S Kim","year":"2013","unstructured":"Kim, H.-S., & Lee, S.-W. (2013). Homomorphic encryption scheme and applications for cloud computing security. SERSC, 10(2), 213\u2013224.","journal-title":"SERSC"},{"key":"6083_CR16","unstructured":"Cho, N.-S., & Hong, D.-W. (2008). Technical trend of the searchable encryption system. ETRI, 23(4)."},{"key":"6083_CR17","doi-asserted-by":"publisher","first-page":"377","DOI":"10.1007\/978-3-642-17373-8_22","volume":"6477","author":"D Stehle","year":"2010","unstructured":"Stehle, D., & Steinfeld, R. (2010). Faster fully homomorphic encryption. Lecture Notes in Computer Science, 6477, 377\u2013394.","journal-title":"Lecture Notes in Computer Science"},{"key":"6083_CR18","doi-asserted-by":"crossref","unstructured":"Damgard, I., & Jurik, M. (2001). A generalization, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In Public Key Cryptography\u2014PKC (pp. 119\u2013136).","DOI":"10.1007\/3-540-44586-2_9"},{"key":"6083_CR19","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume":"6223","author":"R Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., & Parno, B. (2010). Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Lecture Notes in Computer Science, 6223, 465\u2013482.","journal-title":"Lecture Notes in Computer Science"},{"key":"6083_CR20","unstructured":"Rivest, R., Addleman, L., & Dertouzos, M. (1978). On data banks and privacy homomorphism. In Foundations of secure computation (pp. 169\u2013177)."},{"key":"6083_CR21","unstructured":"Kolesnikov, V., Sadeghi, A., & Schneider, T. (2009). How to combine homomorphic encryption and garbled circuits\u2014Improved circuits and computing the minimum distance efficiently. In: Proceedings of SPEED 2009 (pp. 100\u2013121)."}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6083-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-6083-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-6083-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T15:09:37Z","timestamp":1694099377000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-6083-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,27]]},"references-count":21,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["6083"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-6083-9","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,11,27]]},"assertion":[{"value":"27 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}