{"id":"https://openalex.org/W3084492952","doi":"https://doi.org/10.1109/tcad.2020.3022841","title":"hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave","display_name":"hPRESS: A Hardware-Enhanced Proxy Re-Encryption Scheme Using Secure Enclave","publication_year":2020,"publication_date":"2020-09-08","ids":{"openalex":"https://openalex.org/W3084492952","doi":"https://doi.org/10.1109/tcad.2020.3022841","mag":"3084492952"},"language":"en","primary_location":{"id":"doi:10.1109/tcad.2020.3022841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2020.3022841","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/6812","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100403380","display_name":"Fan Zhang","orcid":"https://orcid.org/0000-0001-6087-8243"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fan Zhang","raw_affiliation_strings":["Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Zhejiang University, Hangzhou, China","School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]},{"raw_affiliation_string":"School of Cyber Science and Technology, College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102967648","display_name":"Ziyuan Liang","orcid":null},"institutions":[{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ziyuan Liang","raw_affiliation_strings":["College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I76130692"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060586262","display_name":"Cong Zuo","orcid":"https://orcid.org/0000-0001-9464-7216"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I42894916","display_name":"Data61","ror":"https://ror.org/03q397159","country_code":"AU","type":"other","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I42894916","https://openalex.org/I4387156119"]},{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Cong Zuo","raw_affiliation_strings":["Data 61, CSIRO, Melbourne, VIC, Australia","Faculty of Information Technology, Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Data 61, CSIRO, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I42894916","https://openalex.org/I1292875679"]},{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040489898","display_name":"Jun Shao","orcid":"https://orcid.org/0000-0001-8352-0973"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Shao","raw_affiliation_strings":["School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I111753288","display_name":"Fujian Normal University","ror":"https://ror.org/020azk594","country_code":"CN","type":"education","lineage":["https://openalex.org/I111753288"]},{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["CN","SG"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"College of Mathematics and Informatics, Fujian Normal University, Fuzhou, China","institution_ids":["https://openalex.org/I111753288"]},{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100429004","display_name":"Jun Sun","orcid":"https://orcid.org/0000-0002-3545-1392"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Jun Sun","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023687478","display_name":"Joseph K. Liu","orcid":"https://orcid.org/0000-0001-6656-6240"},"institutions":[{"id":"https://openalex.org/I56590836","display_name":"Monash University","ror":"https://ror.org/02bfwt286","country_code":"AU","type":"education","lineage":["https://openalex.org/I56590836"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Joseph K. Liu","raw_affiliation_strings":["Faculty of Information Technology, Monash University, Clayton, VIC, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information Technology, Monash University, Clayton, VIC, Australia","institution_ids":["https://openalex.org/I56590836"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090113498","display_name":"Yibao Bao","orcid":null},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yibao Bao","raw_affiliation_strings":["Security Department, Alibaba Group, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Security Department, Alibaba Group, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5100403380"],"corresponding_institution_ids":["https://openalex.org/I168879160","https://openalex.org/I4210132990","https://openalex.org/I76130692"],"apc_list":null,"apc_paid":null,"fwci":0.5437,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.73987928,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":"40","issue":"6","first_page":"1144","last_page":"1157"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9595999717712402,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.8841965198516846},{"id":"https://openalex.org/keywords/proxy-re-encryption","display_name":"Proxy re-encryption","score":0.8303251266479492},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.71197509765625},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6795684099197388},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5888200998306274},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5829561948776245},{"id":"https://openalex.org/keywords/proxy","display_name":"Proxy (statistics)","score":0.514517068862915},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.46094995737075806},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.437433660030365},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4237954318523407},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.41578418016433716},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3349870443344116},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16512715816497803},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12598931789398193},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06880062818527222}],"concepts":[{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.8841965198516846},{"id":"https://openalex.org/C2776861820","wikidata":"https://www.wikidata.org/wiki/Q7252899","display_name":"Proxy re-encryption","level":4,"score":0.8303251266479492},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.71197509765625},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6795684099197388},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5888200998306274},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5829561948776245},{"id":"https://openalex.org/C2780148112","wikidata":"https://www.wikidata.org/wiki/Q1432581","display_name":"Proxy (statistics)","level":2,"score":0.514517068862915},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.46094995737075806},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.437433660030365},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4237954318523407},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41578418016433716},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3349870443344116},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16512715816497803},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12598931789398193},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06880062818527222},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tcad.2020.3022841","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcad.2020.3022841","pdf_url":null,"source":{"id":"https://openalex.org/S100835903","display_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","issn_l":"0278-0070","issn":["0278-0070","1937-4151"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-7815","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/6812","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TCAD.2020.3022841","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-7815","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/6812","pdf_url":null,"source":{"id":"https://openalex.org/S4377196871","display_name":"Institutional Knowledge (InK) - Institutional Knowledge at Singapore Management University (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TCAD.2020.3022841","raw_type":"Journal Article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.5}],"awards":[{"id":"https://openalex.org/G4013555790","display_name":null,"funder_award_id":"62072398","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4062712781","display_name":null,"funder_award_id":"61772236","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5043465742","display_name":null,"funder_award_id":"61972094","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6587750203","display_name":null,"funder_award_id":"2020QNA5021","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320317141","display_name":"Research Institute of Cyberspace Governance in Zhejiang University","ror":null},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W19558663","https://openalex.org/W36535589","https://openalex.org/W46948259","https://openalex.org/W75310505","https://openalex.org/W122216430","https://openalex.org/W127178821","https://openalex.org/W204567147","https://openalex.org/W1500253167","https://openalex.org/W1519370602","https://openalex.org/W1532295511","https://openalex.org/W1567827377","https://openalex.org/W1569215146","https://openalex.org/W1590823599","https://openalex.org/W1890078278","https://openalex.org/W1918955636","https://openalex.org/W1933165082","https://openalex.org/W1963941691","https://openalex.org/W1987493859","https://openalex.org/W2031533839","https://openalex.org/W2089562307","https://openalex.org/W2102355710","https://openalex.org/W2110356978","https://openalex.org/W2114428623","https://openalex.org/W2116361063","https://openalex.org/W2124645100","https://openalex.org/W2133141035","https://openalex.org/W2156186849","https://openalex.org/W2164101323","https://openalex.org/W2343895449","https://openalex.org/W2473389213","https://openalex.org/W2483548240","https://openalex.org/W2588578061","https://openalex.org/W2612997195","https://openalex.org/W2726147677","https://openalex.org/W2735733036","https://openalex.org/W2739229037","https://openalex.org/W2765706244","https://openalex.org/W2774002561","https://openalex.org/W2792900670","https://openalex.org/W2888798936","https://openalex.org/W3101072679","https://openalex.org/W6601513130","https://openalex.org/W6605129159","https://openalex.org/W6749640104"],"related_works":["https://openalex.org/W2027329669","https://openalex.org/W2068013785","https://openalex.org/W2551482603","https://openalex.org/W2377217798","https://openalex.org/W2061997827","https://openalex.org/W2951386372","https://openalex.org/W2406675271","https://openalex.org/W2396215754","https://openalex.org/W2070722844","https://openalex.org/W1237244756"],"abstract_inverted_index":{"Proxy":[0],"re-encryption":[1],"(PRE)":[2],"allows":[3],"a":[4,68,100,173],"proxy":[5],"to":[6,10,57],"transform":[7],"one":[8,179,210],"ciphertext":[9,25,79,142],"another":[11],"under":[12],"different":[13],"encryption":[14,164],"keys":[15],"while":[16],"keeping":[17],"the":[18,24,119,128,159,162,167,181,218],"underlying":[19,163],"plaintext":[20],"secret.":[21],"Because":[22],"of":[23,27,36,51,121,161,180,212,217],"transformability":[26],"PRE,":[28],"there":[29,64],"are":[30,43],"many":[31],"potential":[32],"private":[33],"communicating":[34],"applications":[35],"this":[37,96],"feature.":[38],"However,":[39],"existing":[40],"PRE":[41,71,90,102,113,132,202],"schemes":[42,165],"not":[44,66],"as":[45,47],"full-fledged":[46],"expected.":[48],"The":[49,194],"lack":[50],"necessary":[52],"features":[53],"makes":[54],"them":[55],"hard":[56],"apply":[58],"in":[59,187,215],"real-world":[60,93],"scenarios.":[61],"So":[62],"far,":[63],"does":[65],"exist":[67],"unidirectional":[69,130],"multihop":[70,131],"scheme":[72,103,114,133],"with":[73,104,200],"constant":[74,78,137,141],"decryption":[75,138,219],"efficiency":[76,139],"and":[77,85,140,166,190,220],"size":[80,143],"without":[81,144],"extensions.":[82,145],"Impractical":[83],"performance":[84],"weak":[86],"scalability":[87],"also":[88,171],"hinder":[89],"from":[91],"most":[92,182],"applications.":[94],"In":[95],"work,":[97],"we":[98],"present":[99],"new":[101],"secure":[105,116,156,168,184],"hardware":[106],"enclave":[107,185],"named":[108],"<monospace":[109,124,205],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[110,125,206],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">hPRESS</monospace>":[111,126,207],"(hardware-enhanced":[112],"using":[115],"enclave).":[117],"To":[118],"best":[120],"our":[122,152,204],"knowledge,":[123],"is":[127,154,208],"first":[129],"which":[134],"achieves":[135],"both":[136],"A":[146],"detailed":[147],"security":[148,160],"analysis":[149],"demonstrates":[150],"that":[151],"proposal":[153],"CCA":[155],"based":[157,175],"on":[158,176],"enclave.":[169],"We":[170],"implement":[172],"prototype":[174],"Intel":[177],"SGX,":[178],"popular":[183],"techniques":[186],"recent":[188],"years,":[189],"evaluate":[191],"its":[192],"performance.":[193],"experimental":[195],"results":[196],"show":[197],"that,":[198],"compared":[199],"previous":[201],"schemes,":[203],"almost":[209],"order":[211],"magnitude":[213],"faster":[214],"terms":[216],"transformation.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
