{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T18:52:41Z","timestamp":1767984761765,"version":"3.49.0"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T00:00:00Z","timestamp":1721865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U22B2030"],"award-info":[{"award-number":["U22B2030"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35"]}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35"]}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35"]}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35"]}]},{"name":"Shaanxi Provincial Key Research and Development Program","award":["2023-ZDLGY-35"],"award-info":[{"award-number":["2023-ZDLGY-35"]}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-JC-QN-0699"],"award-info":[{"award-number":["2023-JC-QN-0699"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-JC-QN-0699"],"award-info":[{"award-number":["2023-JC-QN-0699"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-JC-QN-0699"],"award-info":[{"award-number":["2023-JC-QN-0699"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-JC-QN-0699"],"award-info":[{"award-number":["2023-JC-QN-0699"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100017596","name":"Natural Science Basic Research Program of Shaanxi Province","doi-asserted-by":"publisher","award":["2023-JC-QN-0699"],"award-info":[{"award-number":["2023-JC-QN-0699"]}],"id":[{"id":"10.13039\/501100017596","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501500"],"award-info":[{"award-number":["2022YFB4501500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501500"],"award-info":[{"award-number":["2022YFB4501500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501500"],"award-info":[{"award-number":["2022YFB4501500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501500"],"award-info":[{"award-number":["2022YFB4501500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501500"],"award-info":[{"award-number":["2022YFB4501500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and National Key Laboratory of Advanced Communication Networks","award":["HHX23641X003"],"award-info":[{"award-number":["HHX23641X003"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M722498"],"award-info":[{"award-number":["2022M722498"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M722498"],"award-info":[{"award-number":["2022M722498"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qin Chuangyuan Cited High-level Innovative and Entrepreneurial Talents Project","award":["QCYRCXM-2022-244"],"award-info":[{"award-number":["QCYRCXM-2022-244"]}]},{"name":"Qin Chuangyuan Cited High-level Innovative and Entrepreneurial Talents Project","award":["QCYRCXM-2022-244"],"award-info":[{"award-number":["QCYRCXM-2022-244"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2024,9]]},"DOI":"10.1007\/s12083-024-01752-5","type":"journal-article","created":{"date-parts":[[2024,7,25]],"date-time":"2024-07-25T08:01:54Z","timestamp":1721894514000},"page":"3476-3488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Enhancing paillier to fully homomorphic encryption with semi-honest TEE"],"prefix":"10.1007","volume":"17","author":[{"given":"Yunyi","family":"Fang","sequence":"first","affiliation":[]},{"given":"Xiaopeng","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yandong","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xingdong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,25]]},"reference":[{"issue":"10","key":"1752_CR1","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","volume":"110","author":"C Marcolla","year":"2022","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek FHP, Aaraj N (2022) Survey on fully homomorphic encryption, theory, and applications. Proc IEEE 110(10):1572\u20131609","journal-title":"Proc IEEE"},{"key":"1752_CR2","doi-asserted-by":"crossref","unstructured":"Yuan ZP, Li P, Li ZL, Xia J (2023) A fully distributed privacy-preserving energy management system for networked microgrid cluster based on homomorphic encryption. IEEE Trans Smart Grid","DOI":"10.1109\/TSG.2023.3309405"},{"issue":"6","key":"1752_CR3","doi-asserted-by":"publisher","first-page":"5230","DOI":"10.1109\/TDSC.2023.3243598","volume":"20","author":"J Zhou","year":"2023","unstructured":"Zhou J, Gao G, Cao Z, Choo KR, Dong X (2023) Lightweight privacy-preserving distributed recommender system using tag-based multikey fully homomorphic data encapsulation. IEEE Trans Depend Secur Comput 20(6):5230\u20135246","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"1752_CR4","doi-asserted-by":"crossref","unstructured":"Paillier P (1999) Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, in EUROCRYPT. Lect Notes Comput Sci 1592:223\u2013238.\u00a0Springer","DOI":"10.1007\/3-540-48910-X_16"},{"key":"1752_CR5","unstructured":"Intel I, ia-32 architectures software developer\u2019s manual (2016) Volume 3A: System Programming Guide Part 1\u00a064"},{"key":"1752_CR6","unstructured":"Wang W, Jiang Y, Shen Q, Huang W, Chen H, Wang S, Wang X, Tang H, Chen K, Lauter K et\u00a0al (2019) Toward scalable fully homomorphic encryption through light trusted computing assistance. arXiv preprint arXiv:1905.07766"},{"key":"1752_CR7","doi-asserted-by":"crossref","unstructured":"Wang Q, Zhou L, Bai J, Koh YS, Cui S, Russello G (2023) Ht2ml: An efficient hybrid framework for privacy-preserving machine learning using he and tee. Comput Secur p 103509","DOI":"10.1016\/j.cose.2023.103509"},{"issue":"10","key":"1752_CR8","doi-asserted-by":"publisher","first-page":"1572","DOI":"10.1109\/JPROC.2022.3205665","volume":"110","author":"C Marcolla","year":"2022","unstructured":"Marcolla C, Sucasas V, Manzano M, Bassoli R, Fitzek FHP, Aaraj N (2022) Survey on fully homomorphic encryption, theory, and applications. Proc IEEE 110(10):1572\u20131609","journal-title":"Proc IEEE"},{"key":"1752_CR9","doi-asserted-by":"crossref","unstructured":"Liu X, Zhu H, Wang F, Zheng Y, Liu Z (2023) Efficient and Privacy-Preserving Neural Network Prediction Scheme with TEE. In ICC IEEE, pp 2306\u20132311","DOI":"10.1109\/ICC45041.2023.10278683"},{"key":"1752_CR10","doi-asserted-by":"crossref","unstructured":"Wu P, Ning J, Shen J, Wang H, Chang E (2022) Hybrid Trust Multi-party Computation with Trusted Execution Environment, in NDSS (The Internet Society)","DOI":"10.14722\/ndss.2022.24173"},{"key":"1752_CR11","doi-asserted-by":"crossref","unstructured":"Lin D, Cao H, Tian C, Sun Y (2022) The Fast Paillier Decryption with Montgomery Modular Multiplication Based on OpenMP. In PAAP (IEEE) pp 1\u20136","DOI":"10.1109\/PAAP56126.2022.10010630"},{"key":"1752_CR12","doi-asserted-by":"crossref","unstructured":"Ogunseyi, Blessing T, Tang B (2020) Fast decryption algorithm for paillier homomorphic cryptosystem, in 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS) (IEEE) pp 803\u2013806","DOI":"10.1109\/ICPICS50287.2020.9202325"},{"key":"1752_CR13","unstructured":"Microsoft Research (2023) Microsoft SEAL (release 4.1). https:\/\/github.com\/Microsoft\/SEAL"},{"key":"1752_CR14","doi-asserted-by":"crossref","unstructured":"Halevi S, Shoup V (2014) Algorithms in HElib, in CRYPTO (1). Lect Notes Comput Sci 8616:554\u2013571.\u00a0Springer","DOI":"10.1007\/978-3-662-44371-2_31"},{"key":"1752_CR15","unstructured":"Polyakov Y, Rohloff K, Ryan GW\u00a0(2017) Palisade lattice cryptography library user manual. Cybersecurity Research Center, New Jersey Institute ofTechnology (NJIT). Tech Rep 15"},{"key":"1752_CR16","unstructured":"Mouchet CV, Bossuat JP, Troncoso-Pastoriza JR, Hubaux JP (2020) Lattigo: A multiparty homomorphic encryption library in go, in Proceedings of the 8th Workshop on Encrypted Computing and Applied Homomorphic Cryptography, CONF, pp 64\u201370"},{"key":"1752_CR17","unstructured":"Cheon JH, Kim A, Kim M, Song YS (2023) Implementation of heaan. https:\/\/github.com\/snucrypto\/HEAAN"},{"key":"1752_CR18","unstructured":"Sadat MN, Aziz MMA, Mohammed N, Chen F, Wang S, Jiang X (2017) Safety: Secure gwas in federated environment through a hybrid solution with intel sgx and homomorphic encryption. arXiv preprint arXiv:1703.02577"},{"key":"1752_CR19","doi-asserted-by":"publisher","first-page":"100118","DOI":"10.1016\/j.array.2021.100118","volume":"13","author":"L Brenna","year":"2022","unstructured":"Brenna L, Singh IS, Johansen HD, Johansen D (2022) Tfhe-rs: A library for safe and secure remote computing using fully homomorphic encryption and trusted execution environments. Array 13:100118","journal-title":"Array"},{"issue":"2","key":"1752_CR20","doi-asserted-by":"publisher","first-page":"84","DOI":"10.3390\/bdcc7020084","volume":"7","author":"M Babenko","year":"2023","unstructured":"Babenko M, Golimblevskaia E, Tchernykh A, Shiriaev E, Ermakova T, Pulido-Gaytan LB, Valuev G, Avetisyan A, Gagloeva LA (2023) A comparative study of secure outsourced matrix multiplication based on homomorphic encryption. Big Data Cogn Comput 7(2):84","journal-title":"Big Data Cogn Comput"},{"key":"1752_CR21","doi-asserted-by":"crossref","unstructured":"Jiang X, Kim M, Lauter KE, Song Y (2018) Secure Outsourced Matrix Computation and Application to Neural Networks, in CCS (ACM), pp 1209\u20131222","DOI":"10.1145\/3243734.3243837"},{"issue":"5","key":"1752_CR22","doi-asserted-by":"publisher","first-page":"5064","DOI":"10.1007\/s11227-022-04850-4","volume":"79","author":"H Huang","year":"2023","unstructured":"Huang H, Zong H (2023) Secure matrix multiplication based on fully homomorphic encryption. J Supercomput 79(5):5064\u20135085","journal-title":"J Supercomput"},{"key":"1752_CR23","doi-asserted-by":"publisher","first-page":"4214","DOI":"10.1109\/TIFS.2023.3290483","volume":"18","author":"W Wu","year":"2023","unstructured":"Wu W, Wang J, Zhang Y, Liu Z, Zhou L, Lin X (2023) Vpip: Values packing in paillier for communication efficient oblivious linear computations. IEEE Trans Inf Forensics Secur 18:4214\u20134228","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1752_CR24","doi-asserted-by":"crossref","unstructured":"Oh H, Ahmad A, Park S, Lee B, Paek Y (2020) TRUSTORE: Side-Channel Resistant Storage for SGX using Intel Hybrid CPU-FPGA, in CCS (ACM), pp 1903\u20131918","DOI":"10.1145\/3372297.3417265"},{"key":"1752_CR25","unstructured":"Wang W, Jiang Y, Shen Q, Huang W, Chen H, Wang S, Wang X, Tang H, Chen K, Lauter KE, Lin D (2019) Toward scalable fully homomorphic encryption through light trusted computing assistance. CoRR abs\/1905.07766"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01752-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01752-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01752-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,3]],"date-time":"2024-10-03T16:17:09Z","timestamp":1727972229000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01752-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,25]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,9]]}},"alternative-id":["1752"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01752-5","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,25]]},"assertion":[{"value":"27 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 June 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 July 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The manuscript does not include human or animal research.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"The manuscript has been submitted solely to this journal and is not published, in press,or submitted elsewhere.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}]}}