{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T13:00:10Z","timestamp":1740142810180,"version":"3.37.3"},"reference-count":22,"publisher":"Oxford University Press (OUP)","issue":"12","license":[{"start":{"date-parts":[[2018,11,3]],"date-time":"2018-11-03T00:00:00Z","timestamp":1541203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472146","61872152"],"award-info":[{"award-number":["61472146","61872152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong Natural Science Funds for Distinguished Young Scholar","award":["2014A030306021"],"award-info":[{"award-number":["2014A030306021"]}]},{"name":"Guangdong Program for Special Support of Top-notch Young Professionals","award":["2015TQ01X796"],"award-info":[{"award-number":["2015TQ01X796"]}]},{"name":"Pearl River Nova Program of Guangzhou","award":["201610010037"],"award-info":[{"award-number":["201610010037"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12,1]]},"DOI":"10.1093\/comjnl\/bxy114","type":"journal-article","created":{"date-parts":[[2018,10,12]],"date-time":"2018-10-12T07:12:44Z","timestamp":1539328364000},"page":"1897-1908","source":"Crossref","is-referenced-by-count":2,"title":["Authorized Function Homomorphic Signature"],"prefix":"10.1093","volume":"61","author":[{"given":"Qingwen","family":"Guo","sequence":"first","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"}]},{"given":"Qiong","family":"Huang","sequence":"additional","affiliation":[{"name":"College of Mathematics and Informatics, South China Agricultural University, Guangzhou, China"}]},{"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"}]}],"member":"286","published-online":{"date-parts":[[2018,11,3]]},"reference":[{"key":"key\n\t\t\t\t2019012509410019800_bxy114C1","first-page":"371","article-title":"Security and privacy for storage and computation in cloud computing","volume":"258","author":"Wei","year":"2014","journal-title":"Inf. Sci."},{"year":"2002","author":"Johnson","key":"key\n\t\t\t\t2019012509410019800_bxy114C2"},{"year":"2014","author":"Boyle","key":"key\n\t\t\t\t2019012509410019800_bxy114C3"},{"year":"2017","author":"Schabh\u00fcser","key":"key\n\t\t\t\t2019012509410019800_bxy114C4"},{"year":"2017","author":"Tsabary","key":"key\n\t\t\t\t2019012509410019800_bxy114C5"},{"year":"2013","author":"Attrapadung","key":"key\n\t\t\t\t2019012509410019800_bxy114C6"},{"year":"2012","author":"Freeman","key":"key\n\t\t\t\t2019012509410019800_bxy114C7"},{"key":"key\n\t\t\t\t2019012509410019800_bxy114C8","first-page":"441","article-title":"Linearly homomorphic structure-preserving signatures and their applications","volume":"77","author":"Libert","year":"2015","journal-title":"Designs Codes Cryptogr."},{"year":"2011","author":"Boneh","key":"key\n\t\t\t\t2019012509410019800_bxy114C9"},{"year":"2014","author":"Catalano","key":"key\n\t\t\t\t2019012509410019800_bxy114C10"},{"year":"2015","author":"Gorbunov","key":"key\n\t\t\t\t2019012509410019800_bxy114C11"},{"year":"2016","author":"Lai","key":"key\n\t\t\t\t2019012509410019800_bxy114C12"},{"year":"2016","author":"Backes","key":"key\n\t\t\t\t2019012509410019800_bxy114C13"},{"year":"2011","author":"Benabbas","key":"key\n\t\t\t\t2019012509410019800_bxy114C14"},{"volume-title":"Privately and Publicly Verifiable Computing Techniques-A Survey","year":"2017","author":"Demirel","key":"key\n\t\t\t\t2019012509410019800_bxy114C15"},{"year":"2010","author":"Gennaro","key":"key\n\t\t\t\t2019012509410019800_bxy114C16"},{"year":"2012","author":"Parno","key":"key\n\t\t\t\t2019012509410019800_bxy114C17"},{"key":"key\n\t\t\t\t2019012509410019800_bxy114C18","first-page":"583","article-title":"SPFM: scalable and privacy-preserving friend matching in mobile cloud","volume":"4","author":"Li","year":"2017","journal-title":"IEEE Internet Things J."},{"year":"2012","author":"Attrapadung","key":"key\n\t\t\t\t2019012509410019800_bxy114C19"},{"year":"2016","author":"Fleischhacker","key":"key\n\t\t\t\t2019012509410019800_bxy114C20"},{"year":"2013","author":"Gennaro","key":"key\n\t\t\t\t2019012509410019800_bxy114C21"},{"year":"2016","author":"Groth","key":"key\n\t\t\t\t2019012509410019800_bxy114C22"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/12\/1897\/26725071\/bxy114.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T11:07:12Z","timestamp":1548414432000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/12\/1897\/5158246"}},"subtitle":[],"editor":[{"given":"Joseph","family":"Liu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2018,11,3]]},"references-count":22,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2018,11,3]]},"published-print":{"date-parts":[[2018,12,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy114","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"type":"print","value":"0010-4620"},{"type":"electronic","value":"1460-2067"}],"subject":[],"published-other":{"date-parts":[[2018,12]]},"published":{"date-parts":[[2018,11,3]]}}}