{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T20:47:08Z","timestamp":1757623628781,"version":"3.44.0"},"reference-count":18,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,7,31]],"date-time":"2022-07-31T00:00:00Z","timestamp":1659225600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1016\/j.hcc.2022.100074","type":"journal-article","created":{"date-parts":[[2022,8,11]],"date-time":"2022-08-11T00:08:39Z","timestamp":1660176519000},"page":"100074","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"title":["Research and design of CRT-based homomorphic ciphertext database system"],"prefix":"10.1016","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3941-2654","authenticated-orcid":false,"given":"De","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Zhenzhen","family":"Li","sequence":"additional","affiliation":[]},{"given":"Haiyang","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Zhenzhen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zichen","family":"Li","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2022.100074_bib0001","series-title":"Fully homomorphic encryption without modulus switching from classical GapSVP\/\/Annual Cryptology Conference","first-page":"868","author":"Brakerski","year":"2012"},{"issue":"4","key":"10.1016\/j.hcc.2022.100074_bib0002","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s001459900030","article-title":"Small solutions to polynomial equations, and low exponent RSA vulnerabilities","volume":"10","author":"Coppersmith","year":"1997","journal-title":"J. Cryptol."},{"issue":"4","key":"10.1016\/j.hcc.2022.100074_bib0003","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","article-title":"A public key cryptosystem and a signature scheme based on discrete logarithms","volume":"31","author":"ElGamal","year":"1985","journal-title":"IEEE Trans. Information Theory"},{"issue":"01","key":"10.1016\/j.hcc.2022.100074_bib0004","first-page":"149","article-title":"Multi-keyword ranked search method based on b\u00a0+ tree","volume":"44","author":"Haiyang","year":"2017","journal-title":"Comput. Sci."},{"issue":"5","key":"10.1016\/j.hcc.2022.100074_bib0005","first-page":"795","article-title":"Research and development trend of bootstrapping in FHE","volume":"8","author":"Liu","year":"2021","journal-title":"J. Cryptol. Res."},{"issue":"5","key":"10.1016\/j.hcc.2022.100074_bib0006","first-page":"795","article-title":"Research and development trend of bootstrapping in FHE","volume":"8","author":"Liu","year":"2021","journal-title":"J. Cryptol. Res."},{"key":"10.1016\/j.hcc.2022.100074_bib0007","series-title":"The two faces of lattices in cryptology\/\/International Cryptography and Lattices Conference","first-page":"146","author":"Nguyen","year":"2001"},{"key":"10.1016\/j.hcc.2022.100074_bib0008","series-title":"Public-key cryptosystems based on composite degree residuosity classes\/\/International conference on the theory and applications of cryptographic techniques","first-page":"223","author":"Paillier","year":"1999"},{"key":"10.1016\/j.hcc.2022.100074_bib0009","series-title":"Proceeding of the 17th IEEE annual symposium on foundations of computer science","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"Rivest","year":"1978"},{"issue":"11","key":"10.1016\/j.hcc.2022.100074_sbref0010","first-page":"181","article-title":"Attribute-based multi-keyword ciphertext retrieval scheme using verifiable hybrid storage","volume":"46","author":"Suzhen","year":"2020","journal-title":"Comput. Eng."},{"issue":"7","key":"10.1016\/j.hcc.2022.100074_bib0011","first-page":"2127","article-title":"Survey on privacy preserving techniques for machine learning","volume":"31","author":"Tan","year":"2020","journal-title":"J. Software"},{"key":"10.1016\/j.hcc.2022.100074_bib0012","first-page":"168","article-title":"Chinese-keyword fuzzy search and extraction over encrypted patent documents[c]\/\/2015 7th international joint conference on knowledge discovery, knowledge engineering and knowledge management (IC3k)","volume":"1","author":"Wei","year":"2015","journal-title":"IEEE"},{"issue":"04","key":"10.1016\/j.hcc.2022.100074_bib0013","first-page":"901","article-title":"Multi-keyword ranked search method supporting dynamic update","volume":"39","author":"Xiaolong","year":"2018","journal-title":"Comput. Eng. Design"},{"issue":"04","key":"10.1016\/j.hcc.2022.100074_bib0014","first-page":"806","article-title":"A database encryption scheme based on searchable encryption","volume":"44","author":"Xize","year":"2021","journal-title":"Chin. J. Comput."},{"issue":"02","key":"10.1016\/j.hcc.2022.100074_bib0015","first-page":"475","article-title":"Recent development of theory and application on homomorphic encryption","volume":"43","author":"Yatao","year":"2021","journal-title":"J. Electr. Inf. Technol."},{"issue":"3","key":"10.1016\/j.hcc.2022.100074_bib0016","first-page":"481","article-title":"An elgamal encryption with fuzzy keyword search on cloud environment","volume":"18","author":"Yilei","year":"2016","journal-title":"IJ Network Security"},{"issue":"2","key":"10.1016\/j.hcc.2022.100074_bib0017","first-page":"340","article-title":"A secure and dynamic multi-keyword ranked search scheme over encryption cloud data","volume":"27","author":"Zhihua","year":"2015","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"07","key":"10.1016\/j.hcc.2022.100074_bib0018","first-page":"1830","article-title":"Survey on homomorphic encryption algorithm and its application in the privacy-preserving for cloud computing","volume":"29","author":"Zongyu","year":"2018","journal-title":"J. Software"}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000265?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295222000265?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T08:39:29Z","timestamp":1757407169000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295222000265"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["S2667295222000265"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100074","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Research and design of CRT-based homomorphic ciphertext database system","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2022.100074","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100074"}}