{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:08:09Z","timestamp":1772935689396,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11401896","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"3906-3913","source":"Crossref","is-referenced-by-count":0,"title":["H_SIG: Privacy-Preserving Auction for Big Data Based on Homomorphic Signcryption"],"prefix":"10.1109","author":[{"given":"Shamsher","family":"Ullah","sequence":"first","affiliation":[{"name":"School of Artificial Intelligence, Shenzhen University,National Engineering Laboratory for Big Data System Computing Technology,Shenzhen,P. R. China,518060"}]},{"given":"Farhan","family":"Ullah","sequence":"additional","affiliation":[{"name":"Prince Mohammad Bin Fahd University,Cybersecurity Center,Khobar,Dhahran,Saudi Arabia,34754"}]},{"given":"Muhammad Umar","family":"Farooq","sequence":"additional","affiliation":[{"name":"Hangzhou International Innovation Institute of Beihang University,Hangzhou,China,311115"}]},{"given":"Gautam","family":"Srivastava","sequence":"additional","affiliation":[{"name":"Brandon University,Department of Math and Computer Science,Brandon,Canada"}]},{"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University,P.R. China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68637-0_21"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-09027-w"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_30"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_21"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/e22010107"},{"key":"ref8","article-title":"Separating two-round secure computation from oblivious transfer","volume-title":"11th Innovations in Theoretical Computer Science Conference (ITCS 2020). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik","author":"Applebaum","year":"2020"},{"key":"ref9","volume-title":"Superposition attack on ot protocols","author":"Ebrahimi","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/090755886"},{"key":"ref11","article-title":"Simple black-box adversarial attacks","volume":"abs\/1905.07121","author":"Guo","year":"2019","journal-title":"CoRR"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52200-1_11"},{"issue":"187","key":"ref13","article-title":"How to exchange secrets with oblivious transfer","volume":"2005","author":"Rabin","year":"2005","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3264497"},{"key":"ref15","first-page":"489","volume":"28","author":"Zhang","year":"2011","journal-title":"A homomorphic signcryption scheme and its application in electronic voting"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2018.2846736"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.10.053"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.10.022"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"101178","DOI":"10.1016\/j.iot.2024.101178","article-title":"The privacy preserving auction mechanisms in iot-based trading market: A survey","volume":"26","author":"Li","year":"2024","journal-title":"Internet of Things"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2024.3353540"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3323669"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000349"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1049\/2023\/1377042"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11401896.pdf?arnumber=11401896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T07:38:26Z","timestamp":1772869106000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11401896\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11401896","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}