{"id":"https://openalex.org/W4407570246","doi":"https://doi.org/10.1007/s00500-025-10454-w","title":"A secure quantum homomorphic encryption ciphertext retrieval scheme","display_name":"A secure quantum homomorphic encryption ciphertext retrieval scheme","publication_year":2025,"publication_date":"2025-02-01","ids":{"openalex":"https://openalex.org/W4407570246","doi":"https://doi.org/10.1007/s00500-025-10454-w"},"language":"en","primary_location":{"id":"doi:10.1007/s00500-025-10454-w","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00500-025-10454-w","pdf_url":null,"source":{"id":"https://openalex.org/S65753830","display_name":"Soft Computing","issn_l":"1432-7643","issn":["1432-7643","1433-7479"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Soft Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066773995","display_name":"Zhenwen Cheng","orcid":null},"institutions":[{"id":"https://openalex.org/I4210151294","display_name":"Shandong Women\u2019s University","ror":"https://ror.org/03rp8h078","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210151294"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhen-Wen Cheng","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","School of Data and Computer Science, Shandong Women\u2019s University, Jinan, 250300, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Data and Computer Science, Shandong Women\u2019s University, Jinan, 250300, China","institution_ids":["https://openalex.org/I4210151294"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005902299","display_name":"Xiu\u2010Bo Chen","orcid":"https://orcid.org/0000-0002-9761-3414"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiu-Bo Chen","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045319978","display_name":"Gang Xu","orcid":"https://orcid.org/0000-0002-1409-252X"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xu","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, 100144, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, 100144, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100714648","display_name":"Yan Chang","orcid":"https://orcid.org/0000-0002-7297-8433"},"institutions":[{"id":"https://openalex.org/I24201400","display_name":"Chengdu University of Information Technology","ror":"https://ror.org/01yxwrh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I24201400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Chang","raw_affiliation_strings":["School of Cybersecurity, Chengdu University of Information Technology, Chengdu, 610225, China"],"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Chengdu University of Information Technology, Chengdu, 610225, China","institution_ids":["https://openalex.org/I24201400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027921973","display_name":"Li-Hua Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I2250955327","display_name":"Huawei Technologies (China)","ror":"https://ror.org/00cmhce21","country_code":"CN","type":"company","lineage":["https://openalex.org/I2250955327"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Li-Hua Miao","raw_affiliation_strings":["Huawei Technologies Co. Ltd, Shenzhen, 518129, China"],"affiliations":[{"raw_affiliation_string":"Huawei Technologies Co. Ltd, Shenzhen, 518129, China","institution_ids":["https://openalex.org/I2250955327"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101885250","display_name":"Yixian Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi-Xian Yang","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050309279","display_name":"Yalan Wang","orcid":"https://orcid.org/0000-0002-6963-7582"},"institutions":[{"id":"https://openalex.org/I28290843","display_name":"University of Surrey","ror":"https://ror.org/00ks66431","country_code":"GB","type":"education","lineage":["https://openalex.org/I28290843"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ya-Lan Wang","raw_affiliation_strings":["Department of Computer Science, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, Surrey, GU2 7XH, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Faculty of Engineering and Physical Sciences, University of Surrey, Guildford, Surrey, GU2 7XH, UK","institution_ids":["https://openalex.org/I28290843"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5066773995"],"corresponding_institution_ids":["https://openalex.org/I139759216","https://openalex.org/I4210151294"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":8.0986,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.96540112,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"29","issue":"3","first_page":"1497","last_page":"1509"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.82038414478302},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6685730218887329},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5955575704574585},{"id":"https://openalex.org/keywords/plaintext-aware-encryption","display_name":"Plaintext-aware encryption","score":0.5372602343559265},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.526986837387085},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5241836905479431},{"id":"https://openalex.org/keywords/malleability","display_name":"Malleability","score":0.5059618353843689},{"id":"https://openalex.org/keywords/ciphertext-indistinguishability","display_name":"Ciphertext indistinguishability","score":0.44262567162513733},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4307180643081665},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.36785268783569336},{"id":"https://openalex.org/keywords/deterministic-encryption","display_name":"Deterministic encryption","score":0.3259319067001343},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.30086272954940796},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.2439594566822052}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.82038414478302},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6685730218887329},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5955575704574585},{"id":"https://openalex.org/C119133118","wikidata":"https://www.wikidata.org/wiki/Q7200761","display_name":"Plaintext-aware encryption","level":5,"score":0.5372602343559265},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.526986837387085},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5241836905479431},{"id":"https://openalex.org/C100980136","wikidata":"https://www.wikidata.org/wiki/Q4668956","display_name":"Malleability","level":4,"score":0.5059618353843689},{"id":"https://openalex.org/C182776695","wikidata":"https://www.wikidata.org/wiki/Q840661","display_name":"Ciphertext indistinguishability","level":5,"score":0.44262567162513733},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4307180643081665},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.36785268783569336},{"id":"https://openalex.org/C57795399","wikidata":"https://www.wikidata.org/wiki/Q5265706","display_name":"Deterministic encryption","level":4,"score":0.3259319067001343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.30086272954940796},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.2439594566822052},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s00500-025-10454-w","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s00500-025-10454-w","pdf_url":null,"source":{"id":"https://openalex.org/S65753830","display_name":"Soft Computing","issn_l":"1432-7643","issn":["1432-7643","1433-7479"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Soft Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W807476078","https://openalex.org/W1540143929","https://openalex.org/W1919818376","https://openalex.org/W1969408209","https://openalex.org/W1972592543","https://openalex.org/W1974510288","https://openalex.org/W1998116711","https://openalex.org/W2001063026","https://openalex.org/W2002372750","https://openalex.org/W2031497397","https://openalex.org/W2043414726","https://openalex.org/W2047568871","https://openalex.org/W2117593045","https://openalex.org/W2166062840","https://openalex.org/W2168676717","https://openalex.org/W2181552571","https://openalex.org/W2579747677","https://openalex.org/W2590518552","https://openalex.org/W2611841458","https://openalex.org/W2949284128","https://openalex.org/W2951483008","https://openalex.org/W2990156130","https://openalex.org/W3006041570","https://openalex.org/W3006093426","https://openalex.org/W3011056995","https://openalex.org/W3084128899","https://openalex.org/W3126863201","https://openalex.org/W3141585064","https://openalex.org/W3160637718","https://openalex.org/W3185803093","https://openalex.org/W3213557542","https://openalex.org/W4220854638","https://openalex.org/W4226076889","https://openalex.org/W4237378407","https://openalex.org/W4256536523","https://openalex.org/W4396887118"],"related_works":["https://openalex.org/W4245054042","https://openalex.org/W4294892315","https://openalex.org/W2910779227","https://openalex.org/W1481771292","https://openalex.org/W2583896045","https://openalex.org/W2138669153","https://openalex.org/W2341723023","https://openalex.org/W1516512945","https://openalex.org/W2613409654","https://openalex.org/W2282389253"],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2025-12-28T23:10:05.387466","created_date":"2025-10-10T00:00:00"}
