{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T11:04:44Z","timestamp":1730286284217,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1109\/ntms.2018.8328713","type":"proceedings-article","created":{"date-parts":[[2018,4,2]],"date-time":"2018-04-02T20:44:07Z","timestamp":1522701847000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Pre-Computing Appropriate Parameters: How to Accelerate Somewhat Homomorphic Encryption for Cloud Auditing"],"prefix":"10.1109","author":[{"given":"Louis","family":"Tajan","sequence":"first","affiliation":[]},{"given":"Moritz","family":"Kaumanns","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Westhoff","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Better key sizes (and attacks) for lwe-based encryption","author":"lindner","year":"2011","journal-title":"Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011"},{"key":"ref11","first-page":"1","article-title":"On ideal lattices and learning with errors over rings","volume":"6110","author":"lyubashev sky","year":"2010","journal-title":"Advances in Cryptology-EUROCRYPT 2010 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques Lecture Notes in Computer Science"},{"key":"ref12","first-page":"2","article-title":"Duality in lattice cryptography","author":"micciancio","year":"2010","journal-title":"Proc Public Key Cryptography"},{"key":"ref13","first-page":"554","author":"peikert","year":"2008","journal-title":"A Framework for Efficient and Composable Oblivious Transfer"},{"key":"ref14","first-page":"34: 1","article-title":"On lattices, learning with errors, random linear codes, and cryptography","volume":"56","author":"regcv","year":"2009","journal-title":"J ACM"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2016.7856690"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22792-9_29","article-title":"Fully homomorphic encryption from ring-lwe and security for key dependent messages","volume":"6841","author":"brakerski","year":"2011","journal-title":"Advances in Cryptology -CRYPTO 2011 Lecture Notes in Computer Science"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref6","article-title":"Multiparty computation from somewhat homomorphic encryption","author":"damgard","year":"2011","journal-title":"Cryptology ePrint Archive Report"},{"journal-title":"Cloud Auditing Data Federation","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374407"},{"journal-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"ref7"},{"journal-title":"An implementation of SomeWhat Homomorphic Encryption scheme from the Ring Learning with Errors","year":"2014","author":"bieberstein","key":"ref2"},{"key":"ref1","article-title":"New algorithms for learning in presence of errors","author":"arora","year":"2011","journal-title":"In Proceedings of the 38th International Colloquim Conference on Automata Languages and Programming-Volume Part I ICALP&#x2019; 11"},{"journal-title":"Can homomorphic encryption be practical? Cryptology ePrint Archive Report 2011\/405","year":"2011","author":"lauter","key":"ref9"}],"event":{"name":"2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","start":{"date-parts":[[2018,2,26]]},"location":"Paris","end":{"date-parts":[[2018,2,28]]}},"container-title":["2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8327376\/8328663\/08328713.pdf?arnumber=8328713","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:25:44Z","timestamp":1643160344000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8328713\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/ntms.2018.8328713","relation":{},"subject":[],"published":{"date-parts":[[2018,2]]}}}