{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:18:48Z","timestamp":1729667928102,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664399","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:48:02Z","timestamp":1385588882000},"page":"214-217","source":"Crossref","is-referenced-by-count":14,"title":["A simple fully homomorphic encryption scheme available in cloud computing"],"prefix":"10.1109","author":[{"given":"Jian","family":"Li","sequence":"first","affiliation":[]},{"given":"Danjie","family":"Song","sequence":"additional","affiliation":[]},{"given":"Sicong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"487","article-title":"Fully homomorphic encryption over the integers with shorter public keys","volume":"6841","author":"coron","year":"2011","journal-title":"LNCS"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"11","first-page":"24","article-title":"Fully homomorphic encryption over the integers","volume":"6110","author":"van dijk","year":"2010","journal-title":"LNCS"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"journal-title":"Veriable Secret-ballot Elections","year":"1987","author":"benaloh","key":"3"},{"key":"2","first-page":"365","article-title":"Probabilistic encryption and how to play mental poker keeping secret al.l partial information","author":"goldwasser","year":"1982","journal-title":"Proceedings of the 17th Symposium on the Theory of Computing"},{"key":"1","first-page":"169","article-title":"On data banks and privacy homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"10"},{"key":"7","first-page":"350","article-title":"A length-flexible threshold cryptosystem with applications","volume":"2727","author":"damgard","year":"2003","journal-title":"LNCS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"5","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1007\/BFb0054135","article-title":"A new public-key cryptosystem as secure as factoring","author":"okamoto","year":"1998","journal-title":"Eurocrypt '98 Lecture Notes in Computer Science(LNCS)1403 Advances in Cryptology Proceedings of Eurocrypt'98"},{"key":"4","first-page":"120","article-title":"Dense probabilistic encryption","author":"benaloh","year":"1994","journal-title":"Proceedings of the Workshop on Selected Areas of Cryptography Kingston on"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664354\/06664399.pdf?arnumber=6664399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:16:33Z","timestamp":1498101393000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664399","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}