{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:01:05Z","timestamp":1764997265197,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cns.2019.8802691","type":"proceedings-article","created":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T17:55:11Z","timestamp":1566496511000},"page":"1-9","source":"Crossref","is-referenced-by-count":8,"title":["Secure Delegation to a Single Malicious Server: Exponentiation in RSA-type Groups"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Di Crescenzo","sequence":"first","affiliation":[]},{"given":"Matluba","family":"Khodjaeva","sequence":"additional","affiliation":[]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[]},{"given":"Vladimir","family":"Shpilrain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","article-title":"Privacy-preserving Outsourcing Schemes of Modular Exponentiations Using Single Untrusted Cloud Server","volume":"11","author":"zhao","year":"2017","journal-title":"KSII Transactions on Internet and Information Systems"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/SFCS.1982.38"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/3-540-47721-7_14"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1007\/978-3-642-33167-1_31"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1007\/978-3-319-45744-4_13"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1007\/978-3-642-14623-7_26"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1007\/3-540-46513-8_12"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/3140649.3140657"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/CNS.2017.8228702"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1007\/978-3-319-96418-8_17"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10623-005-3710-8"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-14623-7_25"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/359340.359342"},{"key":"ref4","first-page":"236","article-title":"Fast batch verification for modular exponentiation and digital signatures","author":"bellare","year":"0","journal-title":"Proceedings of EUROCRYPT 1998"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/s10586-013-0252-0"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/PERCOMW.2007.98"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/3-540-36552-4_21"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1007\/978-3-319-11203-9_19"},{"key":"ref5","article-title":"Pippenger's Exponentiation Algorithm","author":"bernstein","year":"2002","journal-title":"CiteSeer"},{"key":"ref8","first-page":"449","article-title":"Verifiable Outsourcing Computation of Modular Exponentiations with Single Server","volume":"19","author":"cai","year":"2017","journal-title":"International Journal of Security and Networks"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1007\/3-540-47555-9_18"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/3-540-47721-7_24"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/978-3-319-24837-0_10"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/s10207-014-0236-y"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1007\/BFb0052232"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/116825.116852"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1536414.1536440"},{"key":"ref24","first-page":"264","article-title":"How to securely outsource cryptographic computations","author":"hohenberger","year":"0","journal-title":"Proc of TCC 2005"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2699436"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1007\/3-540-48658-5_11"},{"key":"ref25","first-page":"383","article-title":"Secure server-aided signature generation","author":"jakobsson","year":"1992","journal-title":"Proc Public Key Cryptography"}],"event":{"name":"2019 IEEE Conference on Communications and Network Security (CNS)","start":{"date-parts":[[2019,6,10]]},"location":"Washington DC, DC, USA","end":{"date-parts":[[2019,6,12]]}},"container-title":["2019 IEEE Conference on Communications and Network Security (CNS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8790401\/8802631\/08802691.pdf?arnumber=8802691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:52:39Z","timestamp":1658155959000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8802691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/cns.2019.8802691","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}