{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:10:57Z","timestamp":1772644257597,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0802000"],"award-info":[{"award-number":["2017YFB0802000"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902327"],"award-info":[{"award-number":["61902327"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872060"],"award-info":[{"award-number":["61872060"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Financial Mathematics of Fujian Province University","award":["JR201903"],"award-info":[{"award-number":["JR201903"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2017M623008"],"award-info":[{"award-number":["2017M623008"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Youth Scientific and Technology Innovation Team Project of SWPU","award":["2019CXTD05"],"award-info":[{"award-number":["2019CXTD05"]}]},{"DOI":"10.13039\/100012542","name":"Sichuan Province Science and Technology Support Program","doi-asserted-by":"publisher","award":["2018GZ0102"],"award-info":[{"award-number":["2018GZ0102"]}],"id":[{"id":"10.13039\/100012542","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2981503","type":"journal-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T21:04:29Z","timestamp":1584479069000},"page":"54402-54414","source":"Crossref","is-referenced-by-count":16,"title":["LDVAS: Lattice-Based Designated Verifier Auditing Scheme for Electronic Medical Data in Cloud-Assisted WBANs"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3993-0478","authenticated-orcid":false,"given":"Xiaojun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Chao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jingwei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Gong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2695449"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2019.2918022"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.2975792"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2947476"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.10.020"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-013-3138-7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2631951"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89255-7_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2819121"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/6874158"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2789893"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-010-0252-4"},{"key":"ref20","first-page":"131","article-title":"Lattice-based cryptography","author":"micciancio","year":"2006","journal-title":"Adv Cryptology"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_27"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref23","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","author":"shamir","year":"1984","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0270-9"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2746539.2746576"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-42045-0_16"},{"key":"ref59","volume":"671","author":"micciancio","year":"2012","journal-title":"Complexity of Lattice Problems A Cryptographic Perspective"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_6"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s00224-010-9278-3"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_23"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48523-6_1"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2942297"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.09.013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_17"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416350"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2010.5416352"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2520886"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.245"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2646913"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2615853"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2428620"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2601070"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2929045"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795293172"},{"key":"ref19","year":"2017","journal-title":"IBM Makes Breakthrough in Race to Commercialize Quantum Computers"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2013.6616116"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"singh","year":"2010","journal-title":"Commun ACM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2018.2832251"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s19102395"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2908400"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-012-4681-9"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2010.12.006"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_14"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_8"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_1"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53890-6_13"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0346-y"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2662216"},{"key":"ref44","first-page":"75","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","author":"gentry","year":"2013","journal-title":"Proc Annu Cryptol Conf"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2019.2927219"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09039544.pdf?arnumber=9039544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:08:10Z","timestamp":1641949690000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9039544\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2981503","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}