{"id":"https://openalex.org/W2999424232","doi":"https://doi.org/10.1109/jiot.2020.2964015","title":"Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things","display_name":"Practical and Secure Outsourcing Algorithms for Solving Quadratic Congruences in Internet of Things","publication_year":2020,"publication_date":"2020-01-07","ids":{"openalex":"https://openalex.org/W2999424232","doi":"https://doi.org/10.1109/jiot.2020.2964015","mag":"2999424232"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.2964015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2964015","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101598769","display_name":"Hanlin Zhang","orcid":"https://orcid.org/0000-0001-8869-6863"},"institutions":[{"id":"https://openalex.org/I108688024","display_name":"Qingdao University","ror":"https://ror.org/021cj6z65","country_code":"CN","type":"education","lineage":["https://openalex.org/I108688024"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hanlin Zhang","raw_affiliation_strings":["School of Computer Science and Technology and Business School, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology and Business School, Qingdao University, Qingdao, China","institution_ids":["https://openalex.org/I108688024"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["School of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020719348","display_name":"Chengliang Tian","orcid":"https://orcid.org/0000-0002-2474-910X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chengliang Tian","raw_affiliation_strings":["School of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025502225","display_name":"Guobin Xu","orcid":"https://orcid.org/0000-0002-9483-5388"},"institutions":[{"id":"https://openalex.org/I152830075","display_name":"Frostburg State University","ror":"https://ror.org/048drzm61","country_code":"US","type":"education","lineage":["https://openalex.org/I152830075"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Guobin Xu","raw_affiliation_strings":["Frostburg State University, Frostburg, USA"],"affiliations":[{"raw_affiliation_string":"Frostburg State University, Frostburg, USA","institution_ids":["https://openalex.org/I152830075"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004562212","display_name":"Peng Gao","orcid":"https://orcid.org/0000-0003-4150-163X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Peng Gao","raw_affiliation_strings":["School of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070371129","display_name":"Jie Lin","orcid":"https://orcid.org/0000-0003-3476-110X"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Lin","raw_affiliation_strings":["School of Electronic and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China","School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi\u2019an Jiaotong University, Xi\u2019an, China","institution_ids":["https://openalex.org/I87445476"]},{"raw_affiliation_string":"School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5101598769"],"corresponding_institution_ids":["https://openalex.org/I108688024"],"apc_list":null,"apc_paid":null,"fwci":4.6641,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.95585789,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"7","issue":"4","first_page":"2968","last_page":"2981"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8476015329360962},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6376149654388428},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5976530313491821},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5818417072296143},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5615414381027222},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4962664246559143},{"id":"https://openalex.org/keywords/quadratic-equation","display_name":"Quadratic equation","score":0.47662580013275146},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4650026559829712},{"id":"https://openalex.org/keywords/congruence-relation","display_name":"Congruence relation","score":0.4502425193786621},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4130176901817322},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.35548532009124756},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3276563286781311},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11931034922599792},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07963672280311584}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8476015329360962},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6376149654388428},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5976530313491821},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5818417072296143},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5615414381027222},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4962664246559143},{"id":"https://openalex.org/C129844170","wikidata":"https://www.wikidata.org/wiki/Q41299","display_name":"Quadratic equation","level":2,"score":0.47662580013275146},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4650026559829712},{"id":"https://openalex.org/C9973445","wikidata":"https://www.wikidata.org/wiki/Q8349849","display_name":"Congruence relation","level":2,"score":0.4502425193786621},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4130176901817322},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.35548532009124756},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3276563286781311},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11931034922599792},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07963672280311584},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.2964015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2964015","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4368275634","display_name":null,"funder_award_id":"61402245","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7182399848","display_name":null,"funder_award_id":"61572267","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W154795652","https://openalex.org/W1484276943","https://openalex.org/W1557386445","https://openalex.org/W1561439832","https://openalex.org/W1873037073","https://openalex.org/W1980516015","https://openalex.org/W2000700734","https://openalex.org/W2005991258","https://openalex.org/W2010094835","https://openalex.org/W2026145071","https://openalex.org/W2052572664","https://openalex.org/W2069278736","https://openalex.org/W2076478806","https://openalex.org/W2092732149","https://openalex.org/W2114486350","https://openalex.org/W2145166073","https://openalex.org/W2153193245","https://openalex.org/W2153486647","https://openalex.org/W2323162780","https://openalex.org/W2345334385","https://openalex.org/W2398416149","https://openalex.org/W2404094717","https://openalex.org/W2550617211","https://openalex.org/W2551253694","https://openalex.org/W2594048902","https://openalex.org/W2596636257","https://openalex.org/W2606001152","https://openalex.org/W2625133029","https://openalex.org/W2883825586","https://openalex.org/W2885042590","https://openalex.org/W2885592194","https://openalex.org/W2900975904","https://openalex.org/W2902607665","https://openalex.org/W2908320899","https://openalex.org/W2908333798","https://openalex.org/W2909208245","https://openalex.org/W2914539352","https://openalex.org/W2919605713","https://openalex.org/W2952675638","https://openalex.org/W2964090487","https://openalex.org/W2964294185","https://openalex.org/W2967521687","https://openalex.org/W2970688133","https://openalex.org/W2980257992","https://openalex.org/W3023229947","https://openalex.org/W6682389930","https://openalex.org/W6753326363","https://openalex.org/W6759928910"],"related_works":["https://openalex.org/W2778946875","https://openalex.org/W2023974151","https://openalex.org/W2163207601","https://openalex.org/W4301322097","https://openalex.org/W2103827354","https://openalex.org/W2590546754","https://openalex.org/W4293173044","https://openalex.org/W2358200898","https://openalex.org/W2964315014","https://openalex.org/W3049627489"],"abstract_inverted_index":{"Solving":[0],"quadratic":[1,49,75,91],"congruences":[2,50,92],"is":[3],"a":[4,55,94,143],"widely":[5],"applied":[6,166],"operation":[7],"in":[8,16,62,131],"cryptographic":[9],"protocols":[10],"to":[11,40,44,84,93,158,167],"ensure":[12],"the":[13,17,81,86,109,112,116,122,125,128,139,151,177],"data":[14],"secrecy":[15],"Internet":[18],"of":[19,34,37,89,124,138,145],"Things":[20],"(IoT).":[21],"Yet":[22],"it":[23],"requires":[24],"unaffordable":[25],"computation":[26,88],"resource":[27],"for":[28,73,103],"resource-constrained":[29],"IoT":[30,52,82,104,129,168],"devices":[31,53,83,130],"when":[32],"bulk":[33],"this":[35,60,63],"type":[36],"operations":[38],"need":[39],"be":[41,165],"performed.":[42],"How":[43],"efficiently":[45],"and":[46,69,98,111,127,173,185],"effectively":[47],"solve":[48],"on":[51],"becomes":[54],"challenging":[56],"issue.":[57],"To":[58],"address":[59],"problem,":[61],"article,":[64],"we":[65,107,149],"propose":[66],"two":[67],"practical":[68],"secure":[70,184],"outsourcing":[71,117],"algorithms":[72,79,133,163,182],"solving":[74,90],"congruences.":[76],"Our":[77],"proposed":[78,162,181],"enable":[80],"outsource":[85],"heavy":[87],"single":[95],"cloud":[96,140],"server,":[97],"therefore,":[99],"achieve":[100],"high":[101],"efficiency":[102],"devices.":[105],"Meanwhile,":[106],"obscure":[108],"input":[110],"output":[113],"so":[114],"that":[115,179],"process":[118],"does":[119],"not":[120],"leak":[121],"privacy":[123],"computation,":[126],"our":[132,161,180],"can":[134,164],"detect":[135],"any":[136],"misbehavior":[137],"server":[141],"with":[142],"probability":[144],"1.":[146],"In":[147],"addition,":[148],"take":[150],"Rabin":[152],"encryption":[153],"algorithm":[154],"as":[155],"an":[156],"example":[157],"show":[159],"how":[160],"applications.":[169],"The":[170],"theoretical":[171],"analysis":[172],"experimental":[174],"results":[175],"support":[176],"fact":[178],"are":[183],"efficient.":[186]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":11}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
