{"id":"https://openalex.org/W3094620732","doi":"https://doi.org/10.1109/icccnt49239.2020.9225481","title":"Retracted: Privacy-Cheating Discouragement: A New Homomorphic Encryption Scheme for Cloud Data Security","display_name":"Retracted: Privacy-Cheating Discouragement: A New Homomorphic Encryption Scheme for Cloud Data Security","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3094620732","doi":"https://doi.org/10.1109/icccnt49239.2020.9225481","mag":"3094620732"},"language":"en","primary_location":{"id":"doi:10.1109/icccnt49239.2020.9225481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107945891","display_name":"V. Swathi","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"V. Swathi","raw_affiliation_strings":["School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology,Vellore,India","School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology,Vellore,India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"School of Computer Science and Engineering (SCOPE) Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059949087","display_name":"M.P. Vani","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"M.P. Vani","raw_affiliation_strings":["Vellore Institute of Technology,Vellore,India","Vellore Institute of Technology, Vellore, India"],"affiliations":[{"raw_affiliation_string":"Vellore Institute of Technology,Vellore,India","institution_ids":["https://openalex.org/I876193797"]},{"raw_affiliation_string":"Vellore Institute of Technology, Vellore, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5107945891"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":null,"apc_paid":null,"fwci":0.1372,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.56950077,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8646031618118286},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.742469847202301},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6827086210250854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6499710083007812},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6222331523895264},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6104233264923096},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.5298991799354553},{"id":"https://openalex.org/keywords/cheating","display_name":"Cheating","score":0.5191330313682556},{"id":"https://openalex.org/keywords/semantic-security","display_name":"Semantic security","score":0.42961585521698},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3403194546699524},{"id":"https://openalex.org/keywords/attribute-based-encryption","display_name":"Attribute-based encryption","score":0.2946440875530243},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.18145716190338135},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08136600255966187}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8646031618118286},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.742469847202301},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6827086210250854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6499710083007812},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6222331523895264},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6104233264923096},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.5298991799354553},{"id":"https://openalex.org/C2778024590","wikidata":"https://www.wikidata.org/wiki/Q2357432","display_name":"Cheating","level":2,"score":0.5191330313682556},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.42961585521698},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3403194546699524},{"id":"https://openalex.org/C7646194","wikidata":"https://www.wikidata.org/wiki/Q4818713","display_name":"Attribute-based encryption","level":4,"score":0.2946440875530243},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.18145716190338135},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08136600255966187},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccnt49239.2020.9225481","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccnt49239.2020.9225481","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4699999988079071,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2076478806","https://openalex.org/W2184498111","https://openalex.org/W2195423816","https://openalex.org/W2260785505","https://openalex.org/W2271163303","https://openalex.org/W2299450638","https://openalex.org/W2310106774","https://openalex.org/W2331279951","https://openalex.org/W2344392075","https://openalex.org/W2403036368","https://openalex.org/W2498755361","https://openalex.org/W2507351359","https://openalex.org/W2513299040","https://openalex.org/W2522972287","https://openalex.org/W2538582170","https://openalex.org/W2547926162","https://openalex.org/W2587897831","https://openalex.org/W2597372044","https://openalex.org/W2735653228","https://openalex.org/W2888779882","https://openalex.org/W2911241874","https://openalex.org/W3019887656","https://openalex.org/W3022458346"],"related_works":["https://openalex.org/W2363701519","https://openalex.org/W2292786713","https://openalex.org/W1589129854","https://openalex.org/W2947510282","https://openalex.org/W2153886246","https://openalex.org/W2939324531","https://openalex.org/W2011667854","https://openalex.org/W2583450430","https://openalex.org/W2949316140","https://openalex.org/W2138038098"],"abstract_inverted_index":{"Right":[0],"from":[1],"the":[2,5,20,46,57,68,72,109,111,118,122,125,128,132,146,153,161,177,189],"point":[3],"when":[4],"customers":[6],"are":[7,114,185],"trading":[8],"their":[9,83],"own":[10],"private":[11,84],"/":[12],"confidential":[13],"information":[14,66],"to":[15,19,32,56,105,108,151],"any":[16],"outsider":[17],"or":[18,61,67],"cloud,":[21,110],"by":[22],"then":[23],"there":[24],"is":[25,42,51,89,130,149],"a":[26,78],"lot":[27],"of":[28,127,145,164],"obligation":[29],"with":[30,96,176],"respect":[31],"both":[33],"securities":[34],"as":[35,37],"well":[36,95],"consistency.":[38],"The":[39],"re-appropriating":[40],"process":[41],"computationally":[43],"secure":[44],"on":[45,117],"off":[47],"chance":[48],"that":[49,124],"it":[50],"majorly":[52],"carried-out":[53],"without":[54,81],"divulging":[55],"next":[58],"outside":[59],"operator":[60],"cloud":[62,170],"server,":[63],"either":[64],"first":[65],"real":[69],"answer":[70],"for":[71,169,181],"calculations.":[73],"Secure":[74],"multiparty":[75],"computation":[76],"processes":[77],"specific":[79],"capacity":[80],"uncovering":[82],"data.":[85],"Homomorphic":[86,166],"encryption":[87,101],"technology":[88],"another":[90],"arrangement":[91],"which":[92],"can":[93],"function":[94],"this":[97,140,157],"circumstance.":[98],"In":[99,121,139],"homomorphic":[100],"strategy,":[102],"ciphertext":[103,119],"ought":[104],"be":[106,137],"sent-over":[107],"scientific":[112],"calculations":[113],"carried":[115],"out":[116],"itself.":[120],"event":[123],"resultant":[126],"calculation":[129],"decrypted,":[131],"right":[133],"plaintext":[134],"outcome":[135],"must":[136],"acquired.":[138],"paper,":[141],"an":[142],"extensive":[143],"state":[144],"art":[147],"review":[148],"presented":[150],"analyse":[152],"existing":[154],"protocols":[155],"in":[156,188],"domain.":[158],"We":[159],"given":[160],"comprehensive":[162],"procedure":[163,184],"proposed":[165,183],"Encryption":[167],"protocol":[168],"data":[171],"security.":[172],"Security":[173],"analysis":[174],"along":[175],"experimental":[178],"simulation":[179],"results":[180],"our":[182],"also":[186],"discussed":[187],"paper.":[190]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
