{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T10:54:03Z","timestamp":1759229643315,"version":"3.37.3"},"reference-count":28,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"National Key R&D Program of China","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572390","U1736111"],"award-info":[{"award-number":["61572390","U1736111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20180111"],"award-info":[{"award-number":["MMJJ20180111"]}]},{"name":"Plan For Scientific Innovation Talent of Henan Province","award":["184100510012"],"award-info":[{"award-number":["184100510012"]}]},{"name":"Program for Science & Technology Innovation Talents in Universities of Henan Province","award":["18HASTIT022"],"award-info":[{"award-number":["18HASTIT022"]}]},{"DOI":"10.13039\/501100013057","name":"Innovation Scientists and Technicians Troop Construction Projects of Henan Province","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100013057","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100005320","name":"Xidian University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100005320","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2917028","type":"journal-article","created":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T16:13:08Z","timestamp":1557936788000},"page":"68373-68379","source":"Crossref","is-referenced-by-count":4,"title":["Attack and Improvement on a Symmetric Fully Homomorphic Encryption Scheme"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7703-882X","authenticated-orcid":false,"given":"Wenju","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9148-6346","authenticated-orcid":false,"given":"Yu","family":"Zhan","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Baocang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Ping","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_14"},{"journal-title":"Faster Bootstrapping With Multiple Addends","year":"2017","author":"zhou","key":"ref18"},{"journal-title":"TFHE Fast Fully Homomorphic Encryption Over the Torus","year":"2018","author":"chillotti","key":"ref19"},{"key":"ref28","first-page":"351","article-title":"Prime numbers: A computational perspective","volume":"86","author":"crandall","year":"2001","journal-title":"Math Gazette"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0091534"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref6","first-page":"24","article-title":"Fully homomorphic encryption over the integers","author":"dijk","year":"2010","journal-title":"Proc Adv Cryptol 29th Annu Int Conf Theory Appl Cryptograph Techn (EUROCRYPT)"},{"key":"ref5","first-page":"24","article-title":"Fully homomorphic encryption over the integers","volume":"6110","author":"van dijk","year":"2010","journal-title":"Adv Cryptology"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.09.012"},{"key":"ref2","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"journal-title":"A Guide to Fully Homomorphic Encryption[EB\/OL]","year":"2015","author":"armknecht","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45744-4_15"},{"key":"ref22","first-page":"579","article-title":"Simple analysis on noiseless fully homomorphic encryptions","volume":"4","author":"wang","year":"2017","journal-title":"Research in Cryptology"},{"journal-title":"Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups Without Ciphertext Noise","year":"2014","author":"nuida","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-6620-7_58"},{"journal-title":"Octonion Algebra and Noise-Free Fully Homomorphic Encryption (FHE) Schemes","year":"2016","author":"wang","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_18"},{"journal-title":"Number Theory Library (NTL)","year":"2017","author":"shoup","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08715513.pdf?arnumber=8715513","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:54:54Z","timestamp":1641988494000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8715513\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2917028","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}