{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:59:42Z","timestamp":1774454382772,"version":"3.50.1"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T00:00:00Z","timestamp":1706745600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National Key R&#x0026;D Plan of China","award":["2018YFB1003701"],"award-info":[{"award-number":["2018YFB1003701"]}]},{"name":"Jiangsu Basic Research Programs"},{"name":"Natural Science Foundation","award":["BK20181407"],"award-info":[{"award-number":["BK20181407"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1936118"],"award-info":[{"award-number":["U1936118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672294"],"award-info":[{"award-number":["61672294"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qinglan Project of Jiangsu Province"},{"name":"333 project of Jiangsu Province"},{"name":"Guangxi Key Laboratory of Trusted Software","award":["KX202044"],"award-info":[{"award-number":["KX202044"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Comput."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1109\/tc.2021.3073171","type":"journal-article","created":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T22:53:38Z","timestamp":1618440818000},"page":"340-352","source":"Crossref","is-referenced-by-count":31,"title":["STR: Secure Computation on Additive Shares Using the Share-Transform-Reveal Strategy"],"prefix":"10.1109","volume":"73","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6860-647X","authenticated-orcid":false,"given":"Zhihua","family":"Xia","sequence":"first","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8343-6234","authenticated-orcid":false,"given":"Qi","family":"Gu","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"}]},{"given":"Wenhao","family":"Zhou","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8612-1222","authenticated-orcid":false,"given":"Lizhi","family":"Xiong","sequence":"additional","affiliation":[{"name":"Engineering Research Center of Digital Forensics, Ministry of Education, School of Computer and Software, Jiangsu Engineering Center of Network Monitoring, Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology, Nanjing University of Information Science &#x0026; Technology, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4067-8230","authenticated-orcid":false,"given":"Jian","family":"Weng","sequence":"additional","affiliation":[{"name":"College of Cyber Security, Jinan University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0394-4635","authenticated-orcid":false,"given":"Naixue","family":"Xiong","sequence":"additional","affiliation":[{"name":"School of Computer Science and Technology, Hainan University, Haikou, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600349CM"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS.2016.68"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2020.2985524"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_34"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3335741.3335755"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2913362"},{"key":"ref9","article-title":"Efficient privacy-preserving computation based on additive secret sharing","author":"Xiong","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1561\/9781680837896"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2966632"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516738"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813678"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0011"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_20"},{"key":"ref23","article-title":"ABY2.0: Improved mixed-protocol secure two-party computation","author":"Patra","year":"2020"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_15"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978331"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_6"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2905555"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/72981.72995"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19074-2_2"},{"key":"ref30","first-page":"1651","article-title":"GAZELLE: A low latency framework for secure neural network inference","volume-title":"Proc. 27th USENIX Secur. Symp.","author":"Juvekar"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2932444"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0035"},{"key":"ref33","article-title":"Secure schemes for secret sharing and key distribution","author":"Beimel","year":"1996"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88313-5_13"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.12"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00027"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-60239-0_19"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048038"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2020.3008010"},{"key":"ref44","first-page":"201","article-title":"Cryptonets: Applying neural networks to encrypted data with high throughput and accuracy","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Gilad-Bachrach"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134056"}],"container-title":["IEEE Transactions on Computers"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/12\/10400065\/09404811.pdf?arnumber=9404811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T01:07:12Z","timestamp":1705540032000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9404811\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2]]},"references-count":42,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tc.2021.3073171","relation":{},"ISSN":["0018-9340","1557-9956","2326-3814"],"issn-type":[{"value":"0018-9340","type":"print"},{"value":"1557-9956","type":"electronic"},{"value":"2326-3814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2]]}}}