{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:43:47Z","timestamp":1740149027811,"version":"3.37.3"},"reference-count":27,"publisher":"Wiley","license":[{"start":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T00:00:00Z","timestamp":1630540800000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4212019","62172005","GCIS201808","2019BDKF JJ012"],"award-info":[{"award-number":["4212019","62172005","GCIS201808","2019BDKF JJ012"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["4212019","62172005","GCIS201808","2019BDKF JJ012"],"award-info":[{"award-number":["4212019","62172005","GCIS201808","2019BDKF JJ012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Guangxi Key Laboratory of Cryptography and Information Security","award":["4212019","62172005","GCIS201808","2019BDKF JJ012"],"award-info":[{"award-number":["4212019","62172005","GCIS201808","2019BDKF JJ012"]}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["4212019","62172005","GCIS201808","2019BDKF JJ012"],"award-info":[{"award-number":["4212019","62172005","GCIS201808","2019BDKF JJ012"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2021,9,2]]},"abstract":"<jats:p\/>","DOI":"10.1155\/2021\/3963037","type":"journal-article","created":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T21:35:27Z","timestamp":1630618527000},"page":"1-13","source":"Crossref","is-referenced-by-count":3,"title":["Efficient Cloud-Based Private Set Intersection Protocol with Hidden Access Attribute and Integrity Verification"],"prefix":"10.1155","volume":"2021","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8674-3988","authenticated-orcid":true,"given":"Jianhong","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Information Sciences and Technology, North China University of Technology, 100144 Beijing, China"},{"name":"Guizhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guiyang 550025, Guizhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1818-9019","authenticated-orcid":true,"given":"Menglong","family":"Wu","sequence":"additional","affiliation":[{"name":"School of Information Sciences and Technology, North China University of Technology, 100144 Beijing, China"}]}],"member":"311","reference":[{"key":"1"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/336992.337012"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9034-x"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0044"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_13"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54365-8_8"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315309"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315307"},{"volume-title":"Private Intersection-Sum Protocol with Applications to Attributing Aggregate Ad Conversions","year":"2017","author":"M. Ion","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2414456.2414506"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2245276.2232008"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.041"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1986.10022"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-011-9098-x"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/11535218_15"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00457-5_34"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_13"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_10"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30921-2_4"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.022"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427267"},{"key":"24","article-title":"Fairplay\u2013a secure two-party computation system","volume-title":"USENIX Security Symposium","author":"D. Malkhi","year":"2004"},{"key":"25","first-page":"1","volume-title":"Private Set Intersection: Are Garbled Circuits Better than Custom protocols? In Network and Distributed System Security","author":"Y. Huang","year":"2012"},{"first-page":"797","article-title":"Faster private set intersection based on OT extension","author":"B. Pinkas","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516701"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3963037.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3963037.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2021\/3963037.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,2]],"date-time":"2021-09-02T21:35:37Z","timestamp":1630618537000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2021\/3963037\/"}},"subtitle":[],"editor":[{"given":"Marimuthu","family":"Karuppiah","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2021,9,2]]},"references-count":27,"alternative-id":["3963037","3963037"],"URL":"https:\/\/doi.org\/10.1155\/2021\/3963037","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2021,9,2]]}}}