{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T06:26:56Z","timestamp":1725690416498},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icc.2018.8422482","type":"proceedings-article","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T22:51:41Z","timestamp":1534805501000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted Server"],"prefix":"10.1109","author":[{"given":"Yiming","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhenzhu","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.180"},{"key":"ref11","first-page":"73","article-title":"An Improved Algorithm for Secure Outsourcing of Modular Exponentiations","author":"ye","year":"2015","journal-title":"Proceedings of IEEE International Conference of Advance Information Networking Applications"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1145\/2897845.2897881","article-title":"Verifiable Outsourcing Algorithms for Modular Exponentiations with Improved Checkability","author":"ren","year":"2016","journal-title":"Proc ACM on Asia Conference on Computer and Communications Security"},{"key":"ref13","first-page":"81","article-title":"CRT-Based Outsourcing Algorithms for Modular Exponentiations","author":"kuppusamy","year":"2016","journal-title":"Proc Int Conf Cryptol India"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-005-3710-8"},{"key":"ref15","first-page":"326","article-title":"Securely Outsourcing Exponentiations with Single Untrusted Program for Cloud Storage","author":"wang","year":"2014","journal-title":"Proc European Symposium on Research in Computer Security"},{"key":"ref16","first-page":"261","article-title":"Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions","author":"chevalier","year":"2016","journal-title":"Proc European Symposium on Research in Computer Security"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-014-0254-7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2016.11.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.dcan.2017.05.001"},{"key":"ref4","article-title":"NPP: A New Privacy-Aware Public Auditing Scheme for Cloud Data Sharing with Group Users","author":"fu","year":"2017","journal-title":"IEEE Transactions on Big Data"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2728478"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997370"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.12.007"},{"key":"ref8","first-page":"89","article-title":"Wallet Databases with Observers","author":"chaum","year":"1992","journal-title":"International Cryptology Conference on Advances in Cryptology"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7510991"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2577036"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.191"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1007\/978-3-540-30576-7_15","article-title":"How to Securely Outsource Cryptographic Computations","author":"hohenberger","year":"2005","journal-title":"Proc Theory of Cryptography Conference"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-015-0308-7"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2573770"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996492"},{"key":"ref23","article-title":"RSE-PoW: A role symmetric encryption PoW scheme with authorized deduplication for multimedia data","author":"xiong","year":"2017","journal-title":"Mobile Networks and Applications"}],"event":{"name":"2018 IEEE International Conference on Communications (ICC 2018)","start":{"date-parts":[[2018,5,20]]},"location":"Kansas City, MO","end":{"date-parts":[[2018,5,24]]}},"container-title":["2018 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8411665\/8422068\/08422482.pdf?arnumber=8422482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,29]],"date-time":"2022-08-29T21:41:14Z","timestamp":1661809274000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8422482\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icc.2018.8422482","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}