{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:38Z","timestamp":1750220918414,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":14,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1145\/3368926.3369732","type":"proceedings-article","created":{"date-parts":[[2019,12,20]],"date-time":"2019-12-20T13:30:11Z","timestamp":1576848611000},"page":"502-507","source":"Crossref","is-referenced-by-count":0,"title":["A Study on Batch Verification Scheme in Outsourced Encrypted Database"],"prefix":"10.1145","author":[{"given":"Giau Ho","family":"Kim","sequence":"first","affiliation":[{"name":"Le Quy Don Technical University, Hanoi, Vietnam"}]},{"given":"Manh Tran","family":"Cong","sequence":"additional","affiliation":[{"name":"Le Quy Don Technical University, Hanoi, Vietnam"}]},{"given":"Minh Nguyen","family":"Hieu","sequence":"additional","affiliation":[{"name":"Institute of Cryptography Science and Technology, Hanoi, Vietnam"}]}],"member":"320","reference":[{"key":"key-10.1145\/3368926.3369732-1","unstructured":"Jan Camenisch, Susan Hohenberger, and Michael &#216;stergaard Pedersen. 2012. Batch verification of short signatures. Journal of cryptology 25, 4 (2012), 723--747."},{"key":"key-10.1145\/3368926.3369732-2","unstructured":"Shin-Yan Chiou. 2016. Novel digital signature schemes based on factoring and discrete logarithms. International Journal of Security and Its Applications 10, 3 (2016), 295--310."},{"key":"key-10.1145\/3368926.3369732-3","unstructured":"Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, and Tsuyoshi Takagi. 2013. Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. In Information Security and Cryptology - ICISC 2012, Taekyoung Kwon, Mun-Kyu Lee, and Daesung Kwon (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 425--440."},{"key":"key-10.1145\/3368926.3369732-4","unstructured":"Lein Harn. 1998. Batch verifying multiple RSA digital signatures. Electronics Letters 34, 12 (1998), 1219--1220."},{"key":"key-10.1145\/3368926.3369732-5","doi-asserted-by":"crossref","unstructured":"ES Ismail and NMF Tahat. 2011. A new signature scheme based on multiple hard number theoretic problems. ISRN Communications and Networking 2011 (2011).","DOI":"10.5402\/2011\/231649"},{"key":"key-10.1145\/3368926.3369732-6","unstructured":"Rohit Jain and Sunil Prabhakar. 2013. Trustworthy data from untrusted databases. In Data Engineering (ICDE), 2013 IEEE 29th International Conference on. IEEE, 529--540."},{"key":"key-10.1145\/3368926.3369732-7","unstructured":"Einar Mykletun, Maithili Narasimha, and Gene Tsudik. 2006. Authentication and integrity in outsourced databases. ACM Transactions on Storage (TOS) 2, 2 (2006), 107--138."},{"key":"key-10.1145\/3368926.3369732-8","unstructured":"Muhammad Saqib Niaz and Gunter Saake. 2015. Merkle Hash Tree based Techniques for Data Integrity of Outsourced Data.. In GvD. 66--71."},{"key":"key-10.1145\/3368926.3369732-9","unstructured":"Ronald L. Rivest, Adi Shamir, and Leonard Adleman. 1978. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 2 (1978), 120--126."},{"key":"key-10.1145\/3368926.3369732-10","unstructured":"Claus-Peter Schnorr. 1989. Efficient identification and signatures for smart cards. In Conference on the Theory and Application of Cryptology. Springer, 239--252."},{"key":"key-10.1145\/3368926.3369732-11","unstructured":"Zuhua Shao. 2001. Batch verifying multiple DSA-type digital signatures. Computer Networks 37, 3-4 (2001), 383--389."},{"key":"key-10.1145\/3368926.3369732-12","unstructured":"Ching-Te Wang, Chu-Hsing Lin, and Chin-Chen Chang. 2003. Signature schemes based on two hard problems simultaneously. In 17th International Conference on Advanced Information Networking and Applications, 2003. AINA 2003. IEEE, 557--560."},{"key":"key-10.1145\/3368926.3369732-13","unstructured":"Jiawei Yuan and Shucheng Yu. 2013. Flexible and publicly verifiable aggregation query for outsourced databases in cloud. In Communications and network security (cns), 2013 ieee conference on. IEEE, 520--524."},{"key":"key-10.1145\/3368926.3369732-14","unstructured":"Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. 2015. Integridb: Verifiable SQL for outsourced databases. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 1480--1491."}],"event":{"number":"10","sponsor":["SOICT, School of Information and Communication Technology - HUST","NAFOSTED, The National Foundation for Science and Technology Development"],"acronym":"SoICT 2019","name":"the Tenth International Symposium","start":{"date-parts":[[2019,12,4]]},"location":"Hanoi, Ha Long Bay, Viet Nam","end":{"date-parts":[[2019,12,6]]}},"container-title":["Proceedings of the Tenth International Symposium on Information and Communication Technology  - SoICT 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368926.3369732","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3369732&ftid=2101310&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:05Z","timestamp":1750204385000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3368926.3369732"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2019]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1145\/3368926.3369732","relation":{},"subject":[],"published":{"date-parts":[[2019]]}}}