{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T08:49:37Z","timestamp":1768034977772,"version":"3.49.0"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"Guangxi Key Laboratory of Trusted Software","award":["KX201904"],"award-info":[{"award-number":["KX201904"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["XDJK2019B010"],"award-info":[{"award-number":["XDJK2019B010"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Foundation of Key Laboratory of Machine Perception and Children\u2019s Intelligence Development","award":["16xjpt07"],"award-info":[{"award-number":["16xjpt07"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61462032"],"award-info":[{"award-number":["61462032"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61773320"],"award-info":[{"award-number":["61773320"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["cstc2018jcyjAX0583"],"award-info":[{"award-number":["cstc2018jcyjAX0583"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005230","name":"Natural Science Foundation of Chongqing","doi-asserted-by":"publisher","award":["cstc2018jcyjAX0810"],"award-info":[{"award-number":["cstc2018jcyjAX0810"]}],"id":[{"id":"10.13039\/501100005230","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009587","name":"Chongqing University of Education","doi-asserted-by":"publisher","award":["18GZKP02"],"award-info":[{"award-number":["18GZKP02"]}],"id":[{"id":"10.13039\/501100009587","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2915196","type":"journal-article","created":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T20:48:40Z","timestamp":1557262120000},"page":"60126-60133","source":"Crossref","is-referenced-by-count":6,"title":["Efficient and Secure Outsourcing of DFT, IDFT, and Circular Convolution"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3250-0603","authenticated-orcid":false,"given":"Xiangli","family":"Xiao","sequence":"first","affiliation":[{"name":"School of Electronics and Information Engineering, Southwest University, Chongqing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7995-092X","authenticated-orcid":false,"given":"Junjian","family":"Huang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Machine Perception and Children\u2019s Intelligence Development, Chongqing University of Education, Chongqing, China"}]},{"given":"Yushu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, China"}]},{"given":"Xing","family":"He","sequence":"additional","affiliation":[{"name":"School of Electronics and Information Engineering, Southwest University, Chongqing, China"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4518427"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/0165-1684(84)90064-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1364\/JOSA.73.001832"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1049\/el:19840012"},{"key":"ref37","article-title":"Comparison of different FFT implementations in the encrypted domain","author":"bianchi","year":"2008","journal-title":"Proc Euro Signal Process Conf (EUSIPCO)"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2008.2011087"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2008.4517970"},{"key":"ref34","first-page":"826","article-title":"A variable-length FFT processor base on mixed-radix algorithm for PAPR reduction in OFDM systems","volume":"588","author":"xiang","year":"2012","journal-title":"Adv Mater Res"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1219"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2792300"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2435000"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1965-0178586-1"},{"key":"ref14","author":"proakis","year":"2006","journal-title":"Digital Signal Processing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-557-3.ch189"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref17","first-page":"162","article-title":"How to generate and exchange secrets","author":"yao","year":"2008","journal-title":"Proc IEEE Symp Found Comput Sci (FOCS)"},{"key":"ref18","volume":"20","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2711040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1504\/IJSNET.2019.099473"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2017.2697430"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:20000222"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/25.790538"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.12.055"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ISSPA.2003.1224807"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"1827","DOI":"10.1785\/BSSA0750061827","article-title":"An earthquake detector employing frequency domain techniques","volume":"75","author":"gledhill","year":"1985","journal-title":"Bull Seismo Soc Amer"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/9780470377765"},{"key":"ref2","first-page":"87","article-title":"Speech enhan cement in the DFT domain using Laplacian speech priors","volume":"3","author":"martin","year":"2003","journal-title":"Proc Int Workshop Acoustic Echo Noise Control (IWAENC)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2334952"},{"key":"ref1","author":"frerking","year":"2013","journal-title":"Digital Signal Processing in Communications Systems"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_26"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1755688.1755695"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2013.7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(01)80019-X"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2682244"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417542"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08708176.pdf?arnumber=8708176","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T18:44:21Z","timestamp":1763750661000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8708176\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2915196","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}