{"id":"https://openalex.org/W4387776339","doi":"https://doi.org/10.1007/978-981-99-7356-9_7","title":"Improvements of\u00a0Homomorphic Secure Evaluation of\u00a0Inverse Square Root","display_name":"Improvements of\u00a0Homomorphic Secure Evaluation of\u00a0Inverse Square Root","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4387776339","doi":"https://doi.org/10.1007/978-981-99-7356-9_7"},"language":"en","primary_location":{"id":"doi:10.1007/978-981-99-7356-9_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-7356-9_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017172542","display_name":"Hongyuan Qu","orcid":"https://orcid.org/0000-0002-1684-0819"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyuan Qu","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Qingdao, 266237, China","institution_ids":[]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030897046","display_name":"Guangwu Xu","orcid":"https://orcid.org/0000-0001-6200-3264"},"institutions":[{"id":"https://openalex.org/I4210090956","display_name":"Shandong Institute of Metrology","ror":"https://ror.org/00a4qwj68","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210090956"]},{"id":"https://openalex.org/I4210136793","display_name":"Peng Cheng Laboratory","ror":"https://ror.org/03qdqbt06","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210136793"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guangwu Xu","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Qingdao, 266237, China","Quan Cheng Laboratory, Jinan, 250103, China","School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","Shandong Institute of Blockchain, Jinan, 250101, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security of Ministry of Education, Qingdao, 266237, China","institution_ids":[]},{"raw_affiliation_string":"Quan Cheng Laboratory, Jinan, 250103, China","institution_ids":["https://openalex.org/I4210136793"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Shandong Institute of Blockchain, Jinan, 250101, China","institution_ids":["https://openalex.org/I4210090956"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5030897046"],"corresponding_institution_ids":["https://openalex.org/I4210090956","https://openalex.org/I4210136793","https://openalex.org/I80143920"],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":1.0665,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.79868949,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"110","last_page":"127"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7719073295593262},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6720158457756042},{"id":"https://openalex.org/keywords/taylor-series","display_name":"Taylor series","score":0.6414666771888733},{"id":"https://openalex.org/keywords/newtons-method","display_name":"Newton's method","score":0.6238274574279785},{"id":"https://openalex.org/keywords/square-root","display_name":"Square root","score":0.6131630539894104},{"id":"https://openalex.org/keywords/normalization","display_name":"Normalization (sociology)","score":0.5588440895080566},{"id":"https://openalex.org/keywords/inverse","display_name":"Inverse","score":0.5135996341705322},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.5007076263427734},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44227537512779236},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.35608360171318054},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.34817057847976685},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3062799870967865},{"id":"https://openalex.org/keywords/nonlinear-system","display_name":"Nonlinear system","score":0.09263092279434204}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7719073295593262},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6720158457756042},{"id":"https://openalex.org/C158946198","wikidata":"https://www.wikidata.org/wiki/Q131187","display_name":"Taylor series","level":2,"score":0.6414666771888733},{"id":"https://openalex.org/C85189116","wikidata":"https://www.wikidata.org/wiki/Q374195","display_name":"Newton's method","level":3,"score":0.6238274574279785},{"id":"https://openalex.org/C11577676","wikidata":"https://www.wikidata.org/wiki/Q134237","display_name":"Square root","level":2,"score":0.6131630539894104},{"id":"https://openalex.org/C136886441","wikidata":"https://www.wikidata.org/wiki/Q926129","display_name":"Normalization (sociology)","level":2,"score":0.5588440895080566},{"id":"https://openalex.org/C207467116","wikidata":"https://www.wikidata.org/wiki/Q4385666","display_name":"Inverse","level":2,"score":0.5135996341705322},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.5007076263427734},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44227537512779236},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.35608360171318054},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.34817057847976685},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3062799870967865},{"id":"https://openalex.org/C158622935","wikidata":"https://www.wikidata.org/wiki/Q660848","display_name":"Nonlinear system","level":2,"score":0.09263092279434204},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-981-99-7356-9_7","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-981-99-7356-9_7","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W913176383","https://openalex.org/W1979120705","https://openalex.org/W2034962580","https://openalex.org/W2177209050","https://openalex.org/W2226167778","https://openalex.org/W2519249189","https://openalex.org/W2554750353","https://openalex.org/W2768174108","https://openalex.org/W2801958627","https://openalex.org/W2892648258","https://openalex.org/W2899140612","https://openalex.org/W3181751708","https://openalex.org/W4206266887","https://openalex.org/W4285284542","https://openalex.org/W6676469708"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4390664647","https://openalex.org/W2922438216","https://openalex.org/W2283569872","https://openalex.org/W2384131399","https://openalex.org/W2146659278","https://openalex.org/W2789155380","https://openalex.org/W1495632447","https://openalex.org/W4293508727","https://openalex.org/W3105559563"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2}],"updated_date":"2026-01-20T17:24:06.736184","created_date":"2025-10-10T00:00:00"}
