{"id":"https://openalex.org/W2966679242","doi":"https://doi.org/10.1007/978-3-030-26766-7_11","title":"Research on Full Homomorphic Encryption Algorithm for Integer in Cloud Environment","display_name":"Research on Full Homomorphic Encryption Algorithm for Integer in Cloud Environment","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2966679242","doi":"https://doi.org/10.1007/978-3-030-26766-7_11","mag":"2966679242"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-26766-7_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-26766-7_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100436501","display_name":"Lijuan Wang","orcid":"https://orcid.org/0000-0002-2517-2728"},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lijuan Wang","raw_affiliation_strings":["College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101311332","display_name":"Lina Ge","orcid":"https://orcid.org/0000-0002-2071-222X"},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lina Ge","raw_affiliation_strings":["College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","Key Laboratory of Guangxi High Schools Complex System and Computational Intelligence, Nanning, China","Key Laboratory of Network Communication Engineering, Guangxi University for Nationalities, Nanning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]},{"raw_affiliation_string":"Key Laboratory of Guangxi High Schools Complex System and Computational Intelligence, Nanning, China","institution_ids":[]},{"raw_affiliation_string":"Key Laboratory of Network Communication Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055107771","display_name":"Yugu Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yugu Hu","raw_affiliation_strings":["College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100298299","display_name":"Zhonghua He","orcid":null},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhonghua He","raw_affiliation_strings":["College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066478781","display_name":"Zerong Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zerong Zhao","raw_affiliation_strings":["College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059242893","display_name":"Hangui Wei","orcid":null},"institutions":[{"id":"https://openalex.org/I167274908","display_name":"Guangxi University for Nationalities","ror":"https://ror.org/0495efn48","country_code":"CN","type":"education","lineage":["https://openalex.org/I167274908"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hangui Wei","raw_affiliation_strings":["College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Engineering, Guangxi University for Nationalities, Nanning, China","institution_ids":["https://openalex.org/I167274908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100436501"],"corresponding_institution_ids":["https://openalex.org/I167274908"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":0.5513,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.68040698,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"109","last_page":"117"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9879999756813049,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7953853607177734},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7918400764465332},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7277835607528687},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6213338375091553},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.559302031993866},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.558125913143158},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.5402329564094543},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5331249833106995},{"id":"https://openalex.org/keywords/56-bit-encryption","display_name":"56-bit encryption","score":0.48163026571273804},{"id":"https://openalex.org/keywords/filesystem-level-encryption","display_name":"Filesystem-level encryption","score":0.4553239643573761},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45514681935310364},{"id":"https://openalex.org/keywords/40-bit-encryption","display_name":"40-bit encryption","score":0.45175352692604065},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.4502257704734802},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4048978090286255},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3629681169986725},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11397057771682739}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7953853607177734},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7918400764465332},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7277835607528687},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6213338375091553},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.559302031993866},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.558125913143158},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.5402329564094543},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5331249833106995},{"id":"https://openalex.org/C46905813","wikidata":"https://www.wikidata.org/wiki/Q4640678","display_name":"56-bit encryption","level":4,"score":0.48163026571273804},{"id":"https://openalex.org/C18319499","wikidata":"https://www.wikidata.org/wiki/Q5448402","display_name":"Filesystem-level encryption","level":4,"score":0.4553239643573761},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45514681935310364},{"id":"https://openalex.org/C158215988","wikidata":"https://www.wikidata.org/wiki/Q4637271","display_name":"40-bit encryption","level":3,"score":0.45175352692604065},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.4502257704734802},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4048978090286255},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3629681169986725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11397057771682739}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-030-26766-7_11","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-26766-7_11","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.4099999964237213}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1497981337","https://openalex.org/W1575598731","https://openalex.org/W2031533839","https://openalex.org/W2163921095","https://openalex.org/W2275530856","https://openalex.org/W2393091967","https://openalex.org/W4205651030"],"related_works":["https://openalex.org/W2387840805","https://openalex.org/W4315815885","https://openalex.org/W2361619969","https://openalex.org/W2545514196","https://openalex.org/W2188276378","https://openalex.org/W4240313302","https://openalex.org/W2396533199","https://openalex.org/W3143289714","https://openalex.org/W2111426419","https://openalex.org/W4243621294"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
