{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T00:45:27Z","timestamp":1771461927762,"version":"3.50.1"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"ICT R&D program of MSIP\/IITP [No.10047212, Development of homomorphic encryption supporting arithmetics on ciphertexts of size less than 1kB and its applications] and Samsung Electronics, Co., Ltd. [No. 045020130004]"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/tifs.2015.2398359","type":"journal-article","created":{"date-parts":[[2015,2,2]],"date-time":"2015-02-02T20:20:43Z","timestamp":1422908443000},"page":"1052-1063","source":"Crossref","is-referenced-by-count":66,"title":["A Hybrid Scheme of Public-Key Encryption and Somewhat Homomorphic Encryption"],"prefix":"10.1109","volume":"10","author":[{"family":"Jung Hee Cheon","sequence":"first","affiliation":[]},{"family":"Jinsu Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"ref11","first-page":"355","article-title":"A new index calculus algorithm with complexity $L(1\/4 + o(1))$ in small characteristic","author":"joux","year":"2013","journal-title":"Selected Areas in Cryptography"},{"key":"ref12","article-title":"Efficient cryptosystems from $2^{k}$ -th power residue symbols","author":"joye","year":"2013","journal-title":"Advances in Cryptology"},{"key":"ref13","article-title":"CRT-based fully homomorphic encryption over the integers","author":"kim","year":"2013","journal-title":"IACR Cryptology"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF00203817"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288106"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref17","first-page":"308","article-title":"A new public-key cryptosystem as secure as factoring","volume":"1403","author":"okamoto","year":"1998","journal-title":"Advances in Cryptology"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref19","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"rivest","year":"1978","journal-title":"Found Secure Comput"},{"key":"ref4","first-page":"311","article-title":"Scale-invariant fully homomorphic encryption over the integers","author":"coron","year":"2014","journal-title":"Public-key Cryptography"},{"key":"ref3","first-page":"483","article-title":"Improved delegation of computation using fully homomorphic encryption","volume":"6223","author":"chung","year":"2010","journal-title":"Advances in Cryptology"},{"key":"ref6","first-page":"144","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"IACR Cryptology"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.94"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref2","first-page":"315","article-title":"Batch fully homomorphic encryption over the integers","volume":"7881","author":"cheon","year":"2013","journal-title":"Advances in Cryptology"},{"key":"ref1","article-title":"A quasipolynomial algorithm for discrete logarithm in finite fields of small characteristic","author":"barbulescu","year":"2013"},{"key":"ref9","first-page":"850","article-title":"Homomorphic evaluation of the AES circuit","volume":"7417","author":"gentry","year":"2012","journal-title":"Advances in Cryptology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_14"},{"key":"ref22","first-page":"24","article-title":"Fully homomorphic encryption over the integers","volume":"6110","author":"van dijk","year":"2010","journal-title":"Advances in Cryptology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814630"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/7073680\/07029054.pdf?arnumber=7029054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:47:36Z","timestamp":1642006056000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7029054\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":22,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2015.2398359","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5]]}}}