{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:09:07Z","timestamp":1767337747261,"version":"3.37.3"},"reference-count":38,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3030970","type":"journal-article","created":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T19:28:33Z","timestamp":1602703713000},"page":"191319-191329","source":"Crossref","is-referenced-by-count":6,"title":["How to Securely Collaborate on Data: Decentralized Threshold HE and Secure Key Update"],"prefix":"10.1109","volume":"8","author":[{"given":"Eunkyung","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6785-9835","authenticated-orcid":false,"given":"Jinhyuck","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Hyojin","family":"Yoon","sequence":"additional","affiliation":[]},{"given":"Younghyun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Jihoon","family":"Cho","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7085-2220","authenticated-orcid":false,"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-40186-3_16"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_19"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_26"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SISW.2007.11"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.26"},{"key":"ref37","first-page":"347","article-title":"A full RNS variant of approximate homomorphic encryption","author":"cheon","year":"2018","journal-title":"Proc Int Conf Sel Areas Cryptogr"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30057-8_17"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_19"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30564-4_22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0095-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981818"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20951-3_20"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2866697"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363207"},{"key":"ref28","first-page":"29","article-title":"Strategies of proactive (k, n) threshold secret sharing and application in a secure message exchange system","volume":"19","author":"wang","year":"2008","journal-title":"J Comput"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1880022.1880028"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref29","first-page":"94","article-title":"Verifiable secret redistribution for archive systems","author":"wong","year":"2002","journal-title":"Proc of the 1st International IEEE Security in Storage Workshop IEEE"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref8","first-page":"311","article-title":"Scale-invariant fully homomorphic encryption over the integers","author":"coron","year":"2014","journal-title":"Proc Int Workshop Public Key Cryptogr"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"ref1","volume":"20","author":"gentry","year":"2009","journal-title":"A Fully Homomorphic Encryption Scheme"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref21","first-page":"662","article-title":"Efficient logistic regression on large encrypted data","volume":"2018","author":"han","year":"2018","journal-title":"IACR Cryptology ePrint"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_29"},{"article-title":"Multiparty computation with low communication, computation and interaction via threshold fhe","year":"2011","author":"asharov","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44750-4_27"},{"key":"ref25","first-page":"663","article-title":"Cloud-assisted multiparty computation from fully homomorphic encryption","volume":"2011","author":"l\u00f3pez-alt","year":"2011","journal-title":"IACR Cryptology ePrint"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09223642.pdf?arnumber=9223642","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T01:09:05Z","timestamp":1641949745000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9223642\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3030970","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2020]]}}}