{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:59:35Z","timestamp":1764997175998,"version":"3.37.3"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61703063","61573076","61663008"],"award-info":[{"award-number":["61703063","61573076","61663008"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013223","name":"Chongqing Research Program of Basic Research and Frontier Technology","doi-asserted-by":"crossref","award":["CSTC2017jcyjAX0411"],"award-info":[{"award-number":["CSTC2017jcyjAX0411"]}],"id":[{"id":"10.13039\/501100013223","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Scientific Research Foundation for the Returned Overseas Chinese Scholars","award":["2015-49"],"award-info":[{"award-number":["2015-49"]}]},{"name":"Program for Excellent Talents of Chongqing Higher School","award":["2014-18"],"award-info":[{"award-number":["2014-18"]}]},{"DOI":"10.13039\/501100007957","name":"Chongqing Municipal Education Commission","doi-asserted-by":"publisher","award":["KJ1705139","KJ1600518","KJ1705121","KJ1605002"],"award-info":[{"award-number":["KJ1705139","KJ1600518","KJ1705121","KJ1605002"]}],"id":[{"id":"10.13039\/501100007957","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Chongqing Municipal Social Livelihood Science and Technology Innovation Project","award":["CSTC2016shmszx30026"],"award-info":[{"award-number":["CSTC2016shmszx30026"]}]},{"DOI":"10.13039\/501100007940","name":"Urumqi Science and Technology Bureau","doi-asserted-by":"publisher","award":["Y161320008"],"award-info":[{"award-number":["Y161320008"]}],"id":[{"id":"10.13039\/501100007940","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2846798","type":"journal-article","created":{"date-parts":[[2018,6,13]],"date-time":"2018-06-13T18:51:00Z","timestamp":1528915860000},"page":"35283-35291","source":"Crossref","is-referenced-by-count":11,"title":["Oblivious Transfer Based on NTRUEncrypt"],"prefix":"10.1109","volume":"6","author":[{"given":"Bo","family":"Mi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5068-5162","authenticated-orcid":false,"given":"Darong","family":"Huang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7013-9081","authenticated-orcid":false,"given":"Shaohua","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Libo","family":"Mi","sequence":"additional","affiliation":[]},{"given":"Jianqiu","family":"Cao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"73","article-title":"Speed Records for NTRU","author":"hermans","year":"2010","journal-title":"Proc Topics Cryptol (CT-RSA)"},{"journal-title":"NTRU Quantum-Resistant High Performance Cryptography","year":"2015","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-016-9236-6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4664-7"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-015-9198-0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxx073"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/321964"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2451639"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2016.2581491"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72540-4_33"},{"key":"ref40","first-page":"124","article-title":"High-speed high-security signatures","author":"bernstein","year":"2011","journal-title":"Proc Int Workshop Cryptograph Hardware Embedded Syst"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2746058"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.556673"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"ref14","first-page":"448","article-title":"Efficient oblivious transfer protocols","author":"naor","year":"2001","journal-title":"Proc 12th ACM-SIAM Symp Discrete Algorithms"},{"key":"ref15","first-page":"179","article-title":"Universally composable adaptive oblivious transfer","author":"green","year":"2008","journal-title":"Proc Adv Cryptol Conf"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/978-3-642-00457-5_34","article-title":"Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection","author":"jarecki","year":"2009","journal-title":"Theory of Cryptography"},{"key":"ref17","first-page":"334","article-title":"Simple adaptive oblivious transfer without random oracle","author":"kurosawa","year":"2009","journal-title":"Proc Int Conf Theory Appl Cryptol Inf Secur"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_21"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15317-4_12"},{"key":"ref28","article-title":"The simplest protocol for oblivious transfer","author":"chou","year":"2015","journal-title":"Proc Int Conf Cryptol Inf Secur Latin Amer"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2018.1700330"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.15388\/NA.2014.4.8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3013520"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2703922"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978357"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/j.jpdc.2017.08.007","article-title":"Efficient and secure searchable encryption protocol for cloud-based Internet of Things","volume":"111","author":"wu","year":"2018","journal-title":"J Parallel Distrib Comput"},{"key":"ref8","first-page":"187","article-title":"How to exchange secrets with oblivious transfer","author":"rabin","year":"2005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.11.010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62215"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2569094"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21554-4_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/03610926.2012.752848"},{"key":"ref21","first-page":"681","article-title":"A new approach to practical active-secure two-party computation","author":"nielsen","year":"2012","journal-title":"Proc Int'l Cryptol Conf on Adv in Cryptol (CRYPTO)"},{"key":"ref42","first-page":"3","article-title":"Choosing parameters for NTRUEncrypt","author":"hoffstein","year":"2017","journal-title":"Proc The Cryptographer s Track at RSA Conf"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cam.2012.12.004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68164-9_26"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1080\/03610926.2015.1014112"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11424-011-8368-x"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","article-title":"Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies","author":"jao","year":"2011","journal-title":"Proc Int Conf Post-Quantum Cryptogr"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1142\/S021949881250209X"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08383971.pdf?arnumber=8383971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T16:43:39Z","timestamp":1643215419000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8383971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2846798","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}