{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,6]],"date-time":"2025-10-06T17:47:18Z","timestamp":1759772838881,"version":"3.37.3"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572132","U1705264","61632013"],"award-info":[{"award-number":["61572132","U1705264","61632013"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2880975","type":"journal-article","created":{"date-parts":[[2018,11,12]],"date-time":"2018-11-12T19:36:11Z","timestamp":1542051371000},"page":"70666-70673","source":"Crossref","is-referenced-by-count":11,"title":["A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2868-3398","authenticated-orcid":false,"given":"Changlu","family":"Lin","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huidan","family":"Hu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4892-6550","authenticated-orcid":false,"given":"Shaohua","family":"Tang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2018.8422326"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9161-2"},{"key":"ref12","first-page":"3826","article-title":"A survey of homomorphic encryption for outsourced big data computation","volume":"10","author":"fun","year":"2016","journal-title":"KSII Trans Internet Inf Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2906153"},{"key":"ref14","first-page":"190","article-title":"Publicly verifiable secret sharing","author":"stadler","year":"1996","journal-title":"Advances in Cryptology"},{"key":"ref15","first-page":"32","article-title":"A practical and provably secure scheme for publicly verifiable secret sharing and its applications","author":"fujisaki","year":"1998","journal-title":"Advances in Cryptology"},{"key":"ref16","first-page":"148","article-title":"A Simple publicly verifiable secret sharing scheme and its application to electronic voting","author":"schoenmakers","year":"1999","journal-title":"Advances in Cryptology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-014-9952-6"},{"key":"ref18","first-page":"142","article-title":"Publicly verifiable secret sharing schemes using bilinear pairings","volume":"14","author":"tian","year":"2012","journal-title":"Int J Netw Secur"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2012.0105"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30576-7_15","article-title":"How to securely outsource cryptographic computations","author":"hohenberger","year":"2005","journal-title":"Theory of Cryptography Conference"},{"key":"ref3","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","author":"gennaro","year":"2010","journal-title":"Advances in Cryptology"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374396"},{"key":"ref5","first-page":"30","article-title":"Uncheatable grid computing","author":"du","year":"2010","journal-title":"Algorithms and Theory of Computation Handbook"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.180"},{"key":"ref7","first-page":"425","article-title":"Uncheatable distributed computations","author":"golle","year":"0","journal-title":"Topics in Cryptology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2598342"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.10.040"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1768"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-016-3539-7"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2017.0026"},{"key":"ref23","first-page":"1192","article-title":"A publicly verifiable secret sharing scheme based on multilinear diffie-hellman assumption","volume":"18","author":"peng","year":"2016","journal-title":"Int J Netw Secur"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2857205"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08532343.pdf?arnumber=8532343","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:30:40Z","timestamp":1643243440000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8532343\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2880975","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}