{"id":"https://openalex.org/W3004009246","doi":"https://doi.org/10.1109/ieem44572.2019.8978501","title":"Enhanced MORE Algorithm for Fully Homomorphic Encryption Based on Secret Information Moduli Set","display_name":"Enhanced MORE Algorithm for Fully Homomorphic Encryption Based on Secret Information Moduli Set","publication_year":2019,"publication_date":"2019-12-01","ids":{"openalex":"https://openalex.org/W3004009246","doi":"https://doi.org/10.1109/ieem44572.2019.8978501","mag":"3004009246"},"language":"en","primary_location":{"id":"doi:10.1109/ieem44572.2019.8978501","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ieem44572.2019.8978501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016603684","display_name":"Kamaldeen Jimoh Muhammed","orcid":"https://orcid.org/0000-0001-9258-3810"},"institutions":[{"id":"https://openalex.org/I134542131","display_name":"University of Ilorin","ror":"https://ror.org/032kdwk38","country_code":"NG","type":"education","lineage":["https://openalex.org/I134542131"]}],"countries":["NG"],"is_corresponding":true,"raw_author_name":"K. J. Muhammed","raw_affiliation_strings":["University of Ilorin,Department of Educational Technology,Ilorin,Nigeria","Department of Educational Technology, University of Ilorin, Ilorin, Nigeria"],"affiliations":[{"raw_affiliation_string":"University of Ilorin,Department of Educational Technology,Ilorin,Nigeria","institution_ids":["https://openalex.org/I134542131"]},{"raw_affiliation_string":"Department of Educational Technology, University of Ilorin, Ilorin, Nigeria","institution_ids":["https://openalex.org/I134542131"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072831274","display_name":"Kazeem Alagbe Gbolagade","orcid":"https://orcid.org/0000-0003-1962-3905"},"institutions":[{"id":"https://openalex.org/I98243723","display_name":"Kwara State University","ror":"https://ror.org/05np2xn95","country_code":"NG","type":"education","lineage":["https://openalex.org/I98243723"]}],"countries":["NG"],"is_corresponding":false,"raw_author_name":"K. A. Gbolagade","raw_affiliation_strings":["Kwara State University,Department of Computer Science,Malete,Nigeria","Department of Computer Science, Kwara State University, Malete, Nigeria"],"affiliations":[{"raw_affiliation_string":"Kwara State University,Department of Computer Science,Malete,Nigeria","institution_ids":["https://openalex.org/I98243723"]},{"raw_affiliation_string":"Department of Computer Science, Kwara State University, Malete, Nigeria","institution_ids":["https://openalex.org/I98243723"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5016603684"],"corresponding_institution_ids":["https://openalex.org/I134542131"],"apc_list":null,"apc_paid":null,"fwci":0.28,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.6767773,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"469","last_page":"473"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11693","display_name":"Cryptography and Residue Arithmetic","score":0.9886000156402588,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9024940729141235},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7756184339523315},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7367897033691406},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6162671446800232},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5962699055671692},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5833246111869812},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4799492657184601},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.47415751218795776},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4694124162197113},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.41795897483825684},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.41043686866760254},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32843017578125},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22489318251609802},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.14738336205482483},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08009299635887146}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9024940729141235},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7756184339523315},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7367897033691406},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6162671446800232},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5962699055671692},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5833246111869812},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4799492657184601},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.47415751218795776},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4694124162197113},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.41795897483825684},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.41043686866760254},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32843017578125},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22489318251609802},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.14738336205482483},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08009299635887146},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ieem44572.2019.8978501","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ieem44572.2019.8978501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.44999998807907104,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W1494049356","https://openalex.org/W1557386445","https://openalex.org/W1562767160","https://openalex.org/W1979120705","https://openalex.org/W1992282993","https://openalex.org/W2031533839","https://openalex.org/W2117475864","https://openalex.org/W2129580084","https://openalex.org/W2156030242","https://openalex.org/W2227578511","https://openalex.org/W2395482502","https://openalex.org/W2398360599","https://openalex.org/W2542168764","https://openalex.org/W2591294591","https://openalex.org/W2792830382","https://openalex.org/W2793562718","https://openalex.org/W2897059649","https://openalex.org/W2909971397","https://openalex.org/W2910604321","https://openalex.org/W2944708095","https://openalex.org/W2951895483","https://openalex.org/W2952227635","https://openalex.org/W2972358222","https://openalex.org/W4285719527","https://openalex.org/W6629429546","https://openalex.org/W6633271635","https://openalex.org/W6689378782","https://openalex.org/W6712075820","https://openalex.org/W6712397329","https://openalex.org/W6758336279"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W2625655658","https://openalex.org/W4244478748"],"abstract_inverted_index":{"Cloud":[0],"Computing":[1],"has":[2,29],"offers":[3],"incredible":[4],"benefits":[5],"in":[6],"terms":[7],"of":[8,103,109],"data":[9,12,15,24,76],"storage":[10,107],"and":[11,17,54,78,105],"processing.":[13],"However,":[14],"protection":[16],"privacy":[18,77],"issues":[19],"when":[20],"it":[21],"comes":[22],"to":[23,74,97],"processing":[25],"on":[26,61,114],"the":[27,34,80,88],"cloud":[28],"triggered":[30],"several":[31],"challenges":[32],"for":[33,52],"existing":[35,81],"crypto-systems.":[36],"In":[37],"this":[38],"paper,":[39],"we":[40],"propose":[41],"symmetric":[42],"based":[43,113],"Fully":[44],"Homomorphic":[45],"Encryption":[46,55],"(FHE)":[47],"scheme":[48,67,90,99],"with":[49,100],"Matrix":[50],"Operation":[51],"Randomization":[53],"(MORE)":[56],"that":[57,87],"allows":[58],"arbitrary":[59],"computation":[60],"an":[62],"encrypted":[63],"data.":[64],"The":[65,84],"proposed":[66,89],"uses":[68],"Secret":[69],"Information":[70],"Moduli":[71],"Set":[72],"(SIMS)":[73],"preserved":[75],"enhanced":[79],"MORE":[82,98],"scheme.":[83],"result":[85],"shows":[86],"(MORESIMS)":[91],"tradeoff":[92],"2%":[93],"execution":[94],"time":[95],"compared":[96],"high":[101],"level":[102],"security":[104,116],"better":[106],"overhead":[108],"n":[110,112],"x":[111],"presented":[115],"analysis.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
