{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T22:31:55Z","timestamp":1768516315364,"version":"3.49.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T00:00:00Z","timestamp":1765670400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372096"],"award-info":[{"award-number":["62372096"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,14]]},"DOI":"10.1109\/icpads67057.2025.11323178","type":"proceedings-article","created":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T20:36:54Z","timestamp":1768423014000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["PVPC: Parallel and Verifiable Polynomial Computation with Privacy Protection"],"prefix":"10.1109","author":[{"given":"Zhicheng","family":"Li","sequence":"first","affiliation":[{"name":"Software College, Northeastern University,Shenyang,China,110013"}]},{"given":"Huiyang","family":"He","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University,Shenyang,China,110013"}]},{"given":"Chen","family":"Wang","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University,Shenyang,China,110013"}]},{"given":"Long","family":"Yin","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University,Shenyang,China,110013"}]},{"given":"Jian","family":"Xu","sequence":"additional","affiliation":[{"name":"Software College, Northeastern University,Shenyang,China,110013"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2024.152010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.matpr.2021.11.121"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/InCACCT61598.2024.10551040"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75248-4_19"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE53745.2022.00190"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076580"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-017-0872-3"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-61638-0_17"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660366"},{"key":"ref10","article-title":"Fhe-snark vs. snark-fhe: From analysis to practical verifiable computation","author":"Zhang","year":"2025","journal-title":"Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_9"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14165-2","volume-title":"Automata, Languages and Programming: 37th International Colloquium, ICALP 2010, Bordeaux, France, July 6\u201310, 2010, Proceedings","volume":"6198","author":"Abramsky","year":"2010"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3129314"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_6"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24743-2_32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_25"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2018.2859051"},{"key":"ref18","volume-title":"On data banks and privacy homomorphisms","author":"Rivest","year":"1978"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2856449"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s101070100255"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3537823"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS60453.2023.00337"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897862"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054117400196"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2023.3334890"},{"key":"ref26","article-title":"Polynomial commitments","author":"Kate","year":"2010","journal-title":"Tech. Rep"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.11.063"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2897845.2897910"}],"event":{"name":"2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)","location":"Hefei, China","start":{"date-parts":[[2025,12,14]]},"end":{"date-parts":[[2025,12,18]]}},"container-title":["2025 IEEE 31th International Conference on Parallel and Distributed Systems (ICPADS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11322805\/11322871\/11323178.pdf?arnumber=11323178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T07:41:21Z","timestamp":1768462881000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11323178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icpads67057.2025.11323178","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]}}}