{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T16:55:12Z","timestamp":1775667312542,"version":"3.50.1"},"reference-count":168,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,15]],"date-time":"2025-01-15T00:00:00Z","timestamp":1736899200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Natural Science Funds for Distinguished Young Scholar","award":["62325307"],"award-info":[{"award-number":["62325307"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62073225"],"award-info":[{"award-number":["62073225"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62203134"],"award-info":[{"award-number":["62203134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072315"],"award-info":[{"award-number":["62072315"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62473264"],"award-info":[{"award-number":["62473264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003453","name":"Natural Science Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023B1515120038"],"award-info":[{"award-number":["2023B1515120038"]}],"id":[{"id":"10.13039\/501100003453","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Science, Technology and Innovation Commission of Shenzhen Municipality","doi-asserted-by":"publisher","award":["20220809141216003"],"award-info":[{"award-number":["20220809141216003"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Science, Technology and Innovation Commission of Shenzhen Municipality","doi-asserted-by":"publisher","award":["JCYJ20210324093808021"],"award-info":[{"award-number":["JCYJ20210324093808021"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Science, Technology and Innovation Commission of Shenzhen Municipality","doi-asserted-by":"publisher","award":["JCYJ20220531102817040"],"award-info":[{"award-number":["JCYJ20220531102817040"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangdong \u201cPearl River Talent Recruitment Program\u201d","award":["2019ZT08X603"],"award-info":[{"award-number":["2019ZT08X603"]}]},{"name":"Guangdong \u201cPearl River Talent Plan\u201d","award":["2019JC01X235"],"award-info":[{"award-number":["2019JC01X235"]}]},{"name":"Scientific Instrument Developing Project of Shenzhen University","award":["2023YQ019"],"award-info":[{"award-number":["2023YQ019"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2025,1,15]]},"DOI":"10.1109\/jiot.2024.3472029","type":"journal-article","created":{"date-parts":[[2024,10,11]],"date-time":"2024-10-11T17:22:51Z","timestamp":1728667371000},"page":"1222-1246","source":"Crossref","is-referenced-by-count":10,"title":["Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-2136-3180","authenticated-orcid":false,"given":"Shamsher","family":"Ullah","sequence":"first","affiliation":[{"name":"National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2208-962X","authenticated-orcid":false,"given":"Jianqiang","family":"Li","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9811-1694","authenticated-orcid":false,"given":"Jie","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1499-9594","authenticated-orcid":false,"given":"Ikram","family":"Ali","sequence":"additional","affiliation":[{"name":"National Engineering Laboratory for Big Data System Computing Technology, Shenzhen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1470-0529","authenticated-orcid":false,"given":"Salabat","family":"Khan","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Qilu Institute of Technology, Jinan, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0884-3056","authenticated-orcid":false,"given":"Muhammad Tanveer","family":"Hussain","sequence":"additional","affiliation":[{"name":"Department of Mathematics, University of Management and Technology, Lahore, Pakistan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1030-1275","authenticated-orcid":false,"given":"Farhan","family":"Ullah","sequence":"additional","affiliation":[{"name":"Cybersecurity Center, Prince Mohammad Bin Fahd University, Dhahran, Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3529-2640","authenticated-orcid":false,"given":"Victor C. M.","family":"Leung","sequence":"additional","affiliation":[{"name":"College of Computer Science and Software Engineering, Shenzhen University, Shenzhen, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2730906"},{"key":"ref2","article-title":"The theory and applications of homomorphic cryptography","author":"Henry","year":"2008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5772\/56687"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2633600"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44586-2_9"},{"key":"ref7","article-title":"Verifiable secret-ballot elections","author":"Benaloh","year":"1989"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68339-9_7"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080506"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539704383633"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_18"},{"issue":"11","key":"ref14","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found. Secure Comput."},{"key":"ref15","article-title":"A fully homomorphic encryption scheme","author":"Gentry","year":"2009"},{"key":"ref16","article-title":"A guide to fully homomorphic encryption","author":"Armknecht","year":"2015"},{"key":"ref17","volume-title":"Encyclopedia of Cryptography and Security","author":"Van Tilborg","year":"2014"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_22"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-130480"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1998.674837"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1137\/120868669"},{"key":"ref23","first-page":"505","article-title":"Fully homomorphic encryption from ring-LWE and security for key dependent messages","volume-title":"Proc. 31st Annu. Cryptol. Conf.","author":"Zvika"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_49"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_5"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0095-1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"ref34","volume-title":"Block chain privacy protection method based on addition homomorphic encryption","author":"Liang","year":"2019"},{"key":"ref35","volume-title":"Multi-center block chain transaction privacy protection system and method","author":"Qianhong","year":"2018"},{"key":"ref36","volume-title":"A combined deep learning training method based on a privacy protection technology","author":"Hongwei","year":"2019"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICEIEC.2017.8076532"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1155\/2007\/13801"},{"issue":"6","key":"ref39","first-page":"1624","article-title":"Survey on fully homomorphic encryption","volume":"31","author":"Chen","year":"2014","journal-title":"Appl. Res. Comput."},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.13089\/JKIISC.2014.24.5.941"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3124441"},{"key":"ref42","first-page":"115","article-title":"A survey on privacy-preserving machine learning with fully homomorphic encryption","volume-title":"Proc. Latin Am. High Perf. Comput. Conf.","author":"Pulido-Gaytan"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref46","volume-title":"PALISADE Lattice Cryptography Library User Manual","author":"Polyakov","year":"2017"},{"key":"ref47","first-page":"3","article-title":"Simple encrypted arithmetic library-SEAL v2. 1","volume-title":"Proc. FC Int. Workshops, WAHC, BITCOIN, VOTING, WTSC, TA","author":"Chen"},{"key":"ref48","first-page":"125","article-title":"Fundamentals of fully homomorphic encryption\u2014A survey","volume-title":"Proc. Electron. Colloq. Comput. Complex. (ECCC)","author":"Brakerski"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-7082-3_34"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_27"},{"key":"ref51","article-title":"Homomorphic cryptosystems and their applications","author":"Rappe","year":"2004"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45472-1_7"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68671-1_4"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_14"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45067-X_30"},{"key":"ref56","first-page":"1","article-title":"Cryptography meets watermarking: Detecting watermarks with minimal or zero knowledge disclosure","volume-title":"Proc. 11th Eur. Signal Process. Conf.","author":"Adelsbach"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-69053-0_8"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/83.913598"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.837553"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859383"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/Indo-TaiwanICAN48429.2020.9181325"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2020.0110774"},{"key":"ref63","doi-asserted-by":"crossref","DOI":"10.1016\/j.cosrev.2020.100235","article-title":"Homomorphic encryption systems statement: Trends and challenges","volume":"36","author":"Alaya","year":"2020","journal-title":"Comput. Sci. Rev."},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3394658"},{"issue":"15","key":"ref65","doi-asserted-by":"crossref","first-page":"4253","DOI":"10.3390\/s20154253","article-title":"A survey on secure computation based on homomorphic encryption in vehicular ad hoc networks","volume":"20","author":"Sun","year":"2020","journal-title":"Sensors"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v19i4.16875"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ISCON52037.2021.9702486"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-021-01076-8"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-68035-0_9"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3219049"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s40747-022-00756-z"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3991\/ijoe.v19i11.40267"},{"issue":"7","key":"ref73","doi-asserted-by":"crossref","first-page":"3566","DOI":"10.3390\/s23073566","article-title":"A review of homomorphic encryption for privacy-preserving biometrics","volume":"23","author":"Yang","year":"2023","journal-title":"Sensors"},{"key":"ref74","first-page":"259","volume-title":"A Survey on Private Keyword Sorting and Searching Homomorphic Encryption","author":"Nithya","year":"2023"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-023-02316-9"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"ref77","article-title":"Fully homomorphic encryption scheme with symmetric keys","author":"Sharma","year":"2013","journal-title":"arXiv:1310.2452"},{"key":"ref78","article-title":"Fully homomorphic encryption","author":"Harper","year":"2014"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_28"},{"key":"ref80","article-title":"Efficient integer vector homomorphic encryption","author":"Yu","year":"2015"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref82","first-page":"487","article-title":"Linearly homomorphic encryption from DDH","volume-title":"Proc. Cryptogr. Track RSA Conf.","author":"Castagnos"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0052231"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44670-2_11"},{"issue":"30","key":"ref85","first-page":"11","article-title":"The learning with errors problem","volume":"7","author":"Regev","year":"2010","journal-title":"Invit. Surv. CCC"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-011-9601-2"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref88","article-title":"A new approach for algebraically homomorphic encryption","author":"Armknecht","year":"2008"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.154"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_21"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102366"},{"key":"ref95","article-title":"A mathematical approach to fully homomorphic encryption","author":"Meissen","year":"2012"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41320-9_16"},{"key":"ref98","first-page":"68","article-title":"Towards practical lattice-based public-key encryption on reconfigurable hardware","volume-title":"Proc. Int. Conf. Sel. Areas Cryptogr.","author":"P\u00f6ppelmann"},{"key":"ref99","article-title":"Somewhat practical fully homomorphic encryption","author":"Fan","year":"2012"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref103","article-title":"Cloud-assisted multiparty computation from fully homomorphic encryption","author":"L\u00f3pez-Alt","year":"2011"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1006\/jsco.1996.0125"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"ref106","volume-title":"Electronic Mail","author":"Palme","year":"1995"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1090\/conm\/168\/01688"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1007\/11554868_22"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900030"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44670-2_6"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1137\/0214016"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44670-2_12"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-16295-9_1"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_15"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btv563"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-017-0280-3"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_23"},{"key":"ref118","first-page":"5","article-title":"Practical applications of homomorphic encryption","volume-title":"Proc. SECRYPT","author":"Brenner"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/Med-Hoc-Net.2011.5970495"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.9"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2014.6854089"},{"key":"ref122","first-page":"1","article-title":"R: A language and environment for statistical computing","volume":"1","author":"Core Team","year":"2014","journal-title":"MSOR Connect."},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1186\/1472-6947-15-S5-S3"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0396-0"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2016.2622218"},{"key":"ref126","first-page":"850","article-title":"Homomorphic evaluation of the AES circuit (updated implementation)","volume-title":"Proc. 32nd Annu. Cryptol. Conf.","author":"Gentry"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_28"},{"key":"ref128","first-page":"1","article-title":"Better bootstrapping in fully homomorphic encryption","volume-title":"Proc. Int. Workshop Public Key Cryptogr.","author":"Craig"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_31"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_26"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29360-8_16"},{"key":"ref132","volume-title":"Towards a private new world: Algorithm, protocol, and hardware co-design for large-scale secure computation","author":"Riazi","year":"2020"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69453-5_23"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_30"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-023-05233-z"},{"key":"ref136","article-title":"Using homomorphic encryption for large scale statistical analysis","author":"Wu","year":"2012"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06734-6_20"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_29"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2500576"},{"key":"ref140","article-title":"Homomorphic AES evaluation using NTRU","author":"Doroz","year":"2014"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2014.7041001"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2943127"},{"key":"ref143","article-title":"FPGA implementation of a run-time configurable NTT-based polynomial multiplication hardware","volume":"78","author":"Ahmet Can","year":"2020","journal-title":"Microprocess. Microsyst."},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2013.6572408"},{"key":"ref145","article-title":"Efficient architecture and implementation for NTRU based systems","author":"Liu","year":"2015"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1145\/3531327"},{"issue":"10","key":"ref147","first-page":"546","article-title":"Security issues in cloud computing: The potentials of homomorphic encryption","volume":"2","author":"Atayero","year":"2011","journal-title":"J. Emerg. Trends Comput. Inf. Sci."},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16120-9_9"},{"key":"ref149","volume-title":"Owasp Top 10: The Top 10 Most Critical Web Application Security Threats Enhanced With Text Analytics And Content By Page-Kicker Robot Phil 73","volume":"10","author":"Phil","year":"2014"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_30"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_8"},{"key":"ref152","first-page":"101","article-title":"Quantum secret sharing","volume-title":"Proc. SPIE Quant. Opt. Comput. Commun.","author":"Song"},{"key":"ref153","article-title":"Conditionals in homomorphic encryption and machine learning applications","author":"Chialva","year":"2018","journal-title":"arXiv:1810.12380"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.5220\/0006823203400347"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.3233\/JHS-222016"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2022.100625"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2022.102880"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.4018\/ijmcmc.2021070103"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046766"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"ref162","first-page":"1","article-title":"On the impossibility of cryptography alone for {privacy-preserving} cloud computing","volume-title":"Proc. 5th USENIX Workshop Hot Top. Secur. (HotSec 10)","author":"Van Dijk"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS49365.2020.9212828"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2020.01.016"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC43674.2020.9286176"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_3"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/RTEICT42901.2018.9012261"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/LISAT.2016.7494153"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6488907\/10836656\/10714438.pdf?arnumber=10714438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,13]],"date-time":"2025-01-13T20:10:35Z","timestamp":1736799035000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10714438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,15]]},"references-count":168,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2024.3472029","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"value":"2327-4662","type":"electronic"},{"value":"2372-2541","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,15]]}}}