{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:10:10Z","timestamp":1755911410265,"version":"3.44.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/ieem44572.2019.8978501","type":"proceedings-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T21:27:12Z","timestamp":1580765232000},"page":"469-473","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced MORE Algorithm for Fully Homomorphic Encryption Based on Secret Information Moduli Set"],"prefix":"10.1109","author":[{"given":"K. J.","family":"Muhammed","sequence":"first","affiliation":[{"name":"University of Ilorin,Department of Educational Technology,Ilorin,Nigeria"}]},{"given":"K. A.","family":"Gbolagade","sequence":"additional","affiliation":[{"name":"Kwara State University,Department of Computer Science,Malete,Nigeria"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref11","first-page":"637","article-title":"Efficient Methods for Practical Fully Homomorphic Symmetric-key Encrypton, Randomization and Verification","volume":"2012","author":"kipnis","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1051\/itmconf\/20192705002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICIRCA.2018.8597241"},{"key":"ref14","first-page":"193","article-title":"An Efficient Homomorphic Encryption Protocol for Multi-User Systems","volume":"2012","author":"xiao","year":"2012","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref15","first-page":"502","article-title":"An Improved Fully Homomorphic Encryption Scheme for Cloud Computing","volume":"10","author":"baharon","year":"2018","journal-title":"International Journal of Communication Networks and Information Security"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76687-4_9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.25046\/aj030152"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3264437.3264473"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1556\/012.2015.52.2.1311"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref3","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-12229-8","volume":"3","author":"yi","year":"2014","journal-title":"Homomorphic Encryption and Applications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.94"},{"key":"ref5","first-page":"465","article-title":"Non-interactive verifiable computing: Outsourcing computation to untrusted workers","author":"gennaro","year":"0","journal-title":"Annual Cryptology Conference"},{"key":"ref8","article-title":"A fully homomorphic encryption scheme","volume":"20","author":"gentry","year":"2009","journal-title":"Stanford Univ of Stanford"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"journal-title":"Application of privacy-preserving clustering methods using homomorphic encryption algorithms","year":"2019","author":"aydin","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.02.001"},{"key":"ref9","first-page":"505","article-title":"Fully homomorphic encryption from ring-LWE and security for key dependent messages","author":"brakerski","year":"0","journal-title":"Annual Cryptology Conference"},{"journal-title":"Cryptanalysis of Enhanced MORE","year":"2018","author":"viz\u00e1r","key":"ref20"},{"key":"ref22","first-page":"328","article-title":"A New Efficient RNS Reverse Converter for the 4-Moduli Set","volume":"8","author":"bankas","year":"2014","journal-title":"World Academy of Science Engineering and Technology International Journal of Computer Electrical Automation Control and Information Engineering"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSII.2012.6454344"}],"event":{"name":"2019 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","start":{"date-parts":[[2019,12,15]]},"location":"Macao, China","end":{"date-parts":[[2019,12,18]]}},"container-title":["2019 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8961317\/8978490\/08978501.pdf?arnumber=8978501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:44:30Z","timestamp":1755909870000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8978501\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/ieem44572.2019.8978501","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}