{"id":"https://openalex.org/W3026368930","doi":"https://doi.org/10.1109/jiot.2020.2995677","title":"Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance","display_name":"Privacy-Preserving and Distributed Algorithms for Modular Exponentiation in IoT With Edge Computing Assistance","publication_year":2020,"publication_date":"2020-05-19","ids":{"openalex":"https://openalex.org/W3026368930","doi":"https://doi.org/10.1109/jiot.2020.2995677","mag":"3026368930"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2020.2995677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2995677","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018244121","display_name":"Hongjun Li","orcid":"https://orcid.org/0000-0002-0978-7618"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Hongjun Li","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101598769","display_name":"Hanlin Zhang","orcid":"https://orcid.org/0000-0001-8869-6863"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hanlin Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021485075","display_name":"Ming Yang","orcid":"https://orcid.org/0000-0002-8662-2438"},"institutions":[{"id":"https://openalex.org/I4210158984","display_name":"National Supercomputing Center in Wuxi","ror":"https://ror.org/04ypjrs34","country_code":"CN","type":"other","lineage":["https://openalex.org/I4210158984"]},{"id":"https://openalex.org/I152269853","display_name":"Qilu University of Technology","ror":"https://ror.org/04hyzq608","country_code":"CN","type":"education","lineage":["https://openalex.org/I152269853"]},{"id":"https://openalex.org/I4210142748","display_name":"Shandong Academy of Sciences","ror":"https://ror.org/04y8d6y55","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210142748"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Yang","raw_affiliation_strings":["Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan, China","Shandong Provincial Key Laboratory of Computer Networks, Jinan, China"],"affiliations":[{"raw_affiliation_string":"Qilu University of Technology (Shandong Academy of Sciences), Jinan, China","institution_ids":["https://openalex.org/I152269853","https://openalex.org/I4210142748"]},{"raw_affiliation_string":"Shandong Computer Science Center (National Supercomputer Center in Jinan), Jinan, China","institution_ids":["https://openalex.org/I4210158984"]},{"raw_affiliation_string":"Shandong Provincial Key Laboratory of Computer Networks, Jinan, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082859576","display_name":"Huaqun Wang","orcid":"https://orcid.org/0000-0001-7254-6465"},"institutions":[{"id":"https://openalex.org/I41198531","display_name":"Nanjing University of Posts and Telecommunications","ror":"https://ror.org/043bpky34","country_code":"CN","type":"education","lineage":["https://openalex.org/I41198531"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaqun Wang","raw_affiliation_strings":["Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu Key Laboratory of Big Data Security and Intelligent Processing, Nanjing University of Posts and Telecommunications, Nanjing, China","institution_ids":["https://openalex.org/I41198531"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5018244121"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":3.9768,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.94716444,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"7","issue":"9","first_page":"8769","last_page":"8779"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8442932367324829},{"id":"https://openalex.org/keywords/modular-exponentiation","display_name":"Modular exponentiation","score":0.8066874742507935},{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6246184706687927},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5564579367637634},{"id":"https://openalex.org/keywords/exponentiation","display_name":"Exponentiation","score":0.5311286449432373},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5180092453956604},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5071537494659424},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4636600613594055},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.4489438533782959},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.44370588660240173},{"id":"https://openalex.org/keywords/modular-design","display_name":"Modular design","score":0.44320806860923767},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.42805197834968567},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3518978953361511},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.321209192276001},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.2935779094696045},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10195010900497437},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09783205389976501},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08014315366744995}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8442932367324829},{"id":"https://openalex.org/C152763109","wikidata":"https://www.wikidata.org/wiki/Q1228841","display_name":"Modular exponentiation","level":4,"score":0.8066874742507935},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6246184706687927},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5564579367637634},{"id":"https://openalex.org/C81539297","wikidata":"https://www.wikidata.org/wiki/Q33456","display_name":"Exponentiation","level":2,"score":0.5311286449432373},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5180092453956604},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5071537494659424},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4636600613594055},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.4489438533782959},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.44370588660240173},{"id":"https://openalex.org/C101468663","wikidata":"https://www.wikidata.org/wiki/Q1620158","display_name":"Modular design","level":2,"score":0.44320806860923767},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.42805197834968567},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3518978953361511},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.321209192276001},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2935779094696045},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10195010900497437},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09783205389976501},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08014315366744995},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2020.2995677","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2020.2995677","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[{"id":"https://openalex.org/G5410711530","display_name":null,"funder_award_id":"19KJA310010","funder_id":"https://openalex.org/F4320324207","funder_display_name":"Jiangsu Provincial Department of Education"},{"id":"https://openalex.org/G7182399848","display_name":null,"funder_award_id":"61572267","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8479330993","display_name":null,"funder_award_id":"61941116","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324207","display_name":"Jiangsu Provincial Department of Education","ror":"https://ror.org/059md9404"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W70096886","https://openalex.org/W154795652","https://openalex.org/W1484276943","https://openalex.org/W1513379583","https://openalex.org/W1517725369","https://openalex.org/W1530355549","https://openalex.org/W1873037073","https://openalex.org/W1975199330","https://openalex.org/W2006883188","https://openalex.org/W2014143000","https://openalex.org/W2019883396","https://openalex.org/W2114486350","https://openalex.org/W2128145324","https://openalex.org/W2131132330","https://openalex.org/W2145166073","https://openalex.org/W2170444562","https://openalex.org/W2294667477","https://openalex.org/W2304212389","https://openalex.org/W2323162780","https://openalex.org/W2344770124","https://openalex.org/W2345334385","https://openalex.org/W2346551912","https://openalex.org/W2416799949","https://openalex.org/W2538582170","https://openalex.org/W2550617211","https://openalex.org/W2551253694","https://openalex.org/W2596636257","https://openalex.org/W2748568982","https://openalex.org/W2784714515","https://openalex.org/W2786070938","https://openalex.org/W2794596638","https://openalex.org/W2901827310","https://openalex.org/W2952675638","https://openalex.org/W2954321248","https://openalex.org/W2963583670","https://openalex.org/W2964294185","https://openalex.org/W2997908480","https://openalex.org/W2999324833","https://openalex.org/W3012161448","https://openalex.org/W6602830368","https://openalex.org/W6606426526","https://openalex.org/W6631751386"],"related_works":["https://openalex.org/W4235485585","https://openalex.org/W670148","https://openalex.org/W1507420113","https://openalex.org/W4242613270","https://openalex.org/W2107014706","https://openalex.org/W28274153","https://openalex.org/W2736837562","https://openalex.org/W2020808628","https://openalex.org/W2767903583","https://openalex.org/W2039465140"],"abstract_inverted_index":{"With":[0],"the":[1,27,34,42,65,70,82,106,122,138,147,179,182,188,200,213,217],"development":[2],"of":[3,5,51,59,81,100,155,167,184],"Internet":[4],"Things":[6],"(IoT)":[7],"and":[8,23,30,46,85,125,134,163,172,186,216],"5G,":[9],"edge":[10,36,60,72,115,141,192,218],"computing,":[11],"as":[12,79,93],"a":[13,48,152],"new":[14],"computing":[15,37,61],"paradigm,":[16],"has":[17],"been":[18],"widely":[19,77],"popularized":[20],"in":[21,88,181],"academia":[22],"industry.":[24],"Due":[25],"to":[26,33,41,63,69,203],"distributed":[28,126,164],"architecture":[29],"being":[31],"close":[32],"user,":[35],"can":[38,177],"faster":[39],"respond":[40],"IoT":[43,54],"device's":[44],"request":[45],"provide":[47,199],"better":[49],"quality":[50],"service":[52],"for":[53,129],"applications.":[55],"An":[56],"important":[57],"application":[58],"is":[62,76,149],"outsource":[64],"complicated":[66],"computation":[67],"task":[68],"nearby":[71],"nodes.":[73,116],"Modular":[74],"exponentiation":[75,102,131,169],"considered":[78],"one":[80],"most":[83],"common":[84],"expensive":[86],"operations":[87],"cryptographic":[89],"protocols.":[90],"As":[91],"far":[92],"we":[94,120,159,198],"know,":[95],"all":[96],"secure":[97,124,162],"outsourcing":[98,127,165,185],"algorithms":[99,208],"modular":[101,130,168],"are":[103,209],"based":[104,112],"on":[105,113,211],"centralized":[107],"cloud":[108],"server,":[109],"but":[110],"not":[111],"multiple":[114,139],"In":[117,144,157],"this":[118],"article,":[119],"propose":[121,160],"first":[123],"algorithm":[128,166],"(fixed":[132],"base":[133,171],"variable":[135,173],"exponent)":[136],"under":[137],"noncolluding":[140],"node":[142,219],"model.":[143],"our":[145,206],"algorithm,":[146],"exponent":[148],"divided":[150],"into":[151],"certain":[153],"number":[154],"parts.":[156],"addition,":[158],"another":[161],"(variable":[170],"exponent).":[174],"The":[175],"user":[176,214],"protect":[178],"privacy":[180],"process":[183],"detect":[187],"invalid":[189],"results":[190],"from":[191],"nodes":[193],"with":[194],"high":[195],"probability.":[196],"Finally,":[197],"experimental":[201],"evaluation":[202],"support":[204],"that":[205],"proposed":[207],"efficient":[210],"both":[212],"side":[215],"side.":[220]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":12},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
