{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:39:56Z","timestamp":1763343596541,"version":"3.45.0"},"reference-count":25,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062542","type":"journal-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:06:46Z","timestamp":1745471206000},"page":"937-956","source":"Crossref","is-referenced-by-count":0,"title":["A Fully Homomorphic Encryption Scheme Suitable for Ciphertext Retrieval"],"prefix":"10.32604","volume":"84","author":[{"given":"Ronglei","family":"Hu","sequence":"first","affiliation":[]},{"given":"Chuce","family":"He","sequence":"additional","affiliation":[]},{"given":"Sihui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xiuying","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaoyi","family":"Duan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","series-title":"Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"Song","year":"2000 May 14\u201317"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s42400-024-00323-8","article-title":"Privacy-preserving attribute-based access control using homomorphic encryption","volume":"8","author":"Kerl","year":"2025","journal-title":"Cybersecurity"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1080\/19393555.2022.2033367","article-title":"Searchable encryption: a survey","volume":"32","author":"Sharma","year":"2023","journal-title":"Inf Secur J A Glob Perspect"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"201301","DOI":"10.1007\/s11432-021-3393-x","article-title":"A survey on cryptographic techniques for protecting big data security: present and forthcoming","volume":"65","author":"Lu","year":"2022","journal-title":"Sci China Inf Sci"},{"key":"ref5","first-page":"169","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest","year":"1978","journal-title":"Found Secur Comput"},{"key":"ref6","series-title":"2023 International Conference on Data Science and Network Security (ICDSNS)","first-page":"1","article-title":"Secure encryption scheme for medical data based on homomorphic encryption","author":"Xu","year":"2023 Jul 28\u201329"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"28370","DOI":"10.1109\/JIOT.2024.3400816","article-title":"Lattice-based semantic-aware searchable encryption for Internet of Things","volume":"11","author":"Hou","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"67469","DOI":"10.1007\/s11042-024-18113-2","article-title":"Secure speech retrieval method using deep hashing and CKKS fully homomorphic encryption","volume":"83","author":"Zhang","year":"2024","journal-title":"Multimed Tools Appl"},{"key":"ref9","series-title":"2023 International Conference on Automation, Control and Electronics Engineering (CACEE)","first-page":"83","article-title":"An efficient and more secure searchable encryption algorithm based on fully homomorphic encryption","author":"Liu","year":"2023 Oct 20\u201322"},{"key":"ref10","series-title":"Advances in Cryptology\u2014EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques","first-page":"24","article-title":"Fully homomorphic encryption over the integers","author":"Van Dijk","year":"2010 May 30\u2013Jun 3"},{"key":"ref11","series-title":"Annual Cryptology Conference","first-page":"487","article-title":"Fully homomorphic encryption over the integers with shorter public keys","author":"Coron","year":"2011 Aug 14\u201318"},{"key":"ref12","unstructured":"Black N. Homomorphic encryption and the approximate GCD problem [Internet]. Clemson, SC, USA: Clemson University; 2014 [cited 2025 Mar 24]. Available from: https:\/\/tigerprints.clemson.edu\/all_dissertations\/1280."},{"key":"ref13","doi-asserted-by":"crossref","first-page":"042005","DOI":"10.1088\/1742-6596\/1237\/4\/042005","article-title":"Encryption cipher text retrieval scheme based on fully homomorphic encryption enterprise cloud storage","volume":"1237","author":"Wang","year":"2019","journal-title":"J Phys Conf Ser"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/s11128-020-2603-0","article-title":"Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing","volume":"19","author":"Gong","year":"2020","journal-title":"Quantum Inf Process"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"168547","DOI":"10.1109\/ACCESS.2021.3135050","article-title":"An efficient ciphertext retrieval scheme based on homomorphic encryption for multiple data owners in hybrid cloud","volume":"9","author":"He","year":"2021","journal-title":"IEEE Access"},{"key":"ref16","series-title":"2022 19th Annual International Conference on Privacy, Security & Trust (PST)","first-page":"1","article-title":"An efficient and privacy-preserving range query over encrypted cloud data","author":"Wang","year":"2022 Aug 22\u201324"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"103163","DOI":"10.1016\/j.cose.2023.103163","article-title":"Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing","volume":"128","author":"Wang","year":"2023","journal-title":"Comput Secur"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1186\/s42400-023-00168-7","article-title":"Research on privacy information retrieval model based on hybrid homomorphic encryption","volume":"6","author":"Song","year":"2023","journal-title":"Cybersecurity"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1007\/s00500-025-10454-w","article-title":"A secure quantum homomorphic encryption ciphertext retrieval scheme","volume":"29","author":"Cheng","year":"2025","journal-title":"Soft Comput"},{"key":"ref20","first-page":"144","article-title":"An Improved fully homomorphic encryption scheme under conditions of cloud computing","volume":"2","author":"Xi","year":"2015","journal-title":"Comput Technol Dev"},{"key":"ref21","first-page":"15\u20138,30","article-title":"A ciphertext retrieval algorithm based on full homomorphic encryption","volume":"4","author":"Hong","year":"2018","journal-title":"J Langfang Norm Univ (Nat Sci Ed)"},{"key":"ref22","first-page":"165","author":"Kumar","year":"2016","journal-title":"Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems"},{"key":"ref23","first-page":"8","article-title":"Research on ciphertext full-text retrieval of cloud storage based on improved DGHV algorithm","volume":"19","author":"Qin","year":"2019","journal-title":"Netinfo Secur"},{"key":"ref24","first-page":"156","article-title":"Research on data security scheme of cloud storage platform","volume":"3","author":"Ping","year":"2019","journal-title":"Mod Inf Technol"},{"key":"ref25","first-page":"19","article-title":"HES: a homomorphic encryption scheme with better public key size","volume":"3","author":"Li","year":"2016","journal-title":"J Hengyang Norm Univ"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_62542\/TSP_CMC_62542.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:35:17Z","timestamp":1763343317000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61715"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062542","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]}}}