{"id":"https://openalex.org/W2734490561","doi":"https://doi.org/10.1109/tdsc.2017.2725953","title":"Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing","display_name":"Block Design-Based Key Agreement for Group Data Sharing in Cloud Computing","publication_year":2017,"publication_date":"2017-07-12","ids":{"openalex":"https://openalex.org/W2734490561","doi":"https://doi.org/10.1109/tdsc.2017.2725953","mag":"2734490561"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2017.2725953","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2725953","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Block_design-based_key_agreement_for_group_data_sharing_in_cloud_computing/20835403","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100766011","display_name":"Jian Shen","orcid":"https://orcid.org/0000-0003-0519-9058"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jian Shen","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039491470","display_name":"Tianqi Zhou","orcid":"https://orcid.org/0000-0001-7638-4512"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianqi Zhou","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025668908","display_name":"Debiao He","orcid":"https://orcid.org/0000-0002-2446-7436"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Debiao He","raw_affiliation_strings":["State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, China","State Key Laboratory of Cryptology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Software Engineering, Computer School, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]},{"raw_affiliation_string":"State Key Laboratory of Cryptology, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100762148","display_name":"Yuexin Zhang","orcid":"https://orcid.org/0000-0002-3882-7041"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yuexin Zhang","raw_affiliation_strings":["School of Information Technology, Deakin University, Burwood, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Burwood, Vic, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100388504","display_name":"Xingming Sun","orcid":"https://orcid.org/0000-0001-7982-726X"},"institutions":[{"id":"https://openalex.org/I200845125","display_name":"Nanjing University of Information Science and Technology","ror":"https://ror.org/02y0rxk19","country_code":"CN","type":"education","lineage":["https://openalex.org/I200845125"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingming Sun","raw_affiliation_strings":["School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing, China","institution_ids":["https://openalex.org/I200845125"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100666554","display_name":"Yang Xiang","orcid":"https://orcid.org/0000-0001-5252-0831"},"institutions":[{"id":"https://openalex.org/I57093077","display_name":"Swinburne University of Technology","ror":"https://ror.org/031rekg67","country_code":"AU","type":"education","lineage":["https://openalex.org/I57093077"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yang Xiang","raw_affiliation_strings":["Digital Research & Innovation Capability Platform, Swinburne University of Technology, Hawthorn, Vic, Australia"],"affiliations":[{"raw_affiliation_string":"Digital Research & Innovation Capability Platform, Swinburne University of Technology, Hawthorn, Vic, Australia","institution_ids":["https://openalex.org/I57093077"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100766011"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I200845125","https://openalex.org/I4210156404"],"apc_list":null,"apc_paid":null,"fwci":20.7848,"has_fulltext":false,"cited_by_count":297,"citation_normalized_percentile":{"value":0.9946822,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"16","issue":"6","first_page":"996","last_page":"1010"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9894000291824341,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7833927273750305},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7624112367630005},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.7020399570465088},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6870545148849487},{"id":"https://openalex.org/keywords/data-sharing","display_name":"Data sharing","score":0.6088050603866577},{"id":"https://openalex.org/keywords/key-agreement-protocol","display_name":"Key-agreement protocol","score":0.575087308883667},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.572484016418457},{"id":"https://openalex.org/keywords/group-key","display_name":"Group key","score":0.5605040192604065},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5112295150756836},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4271278977394104},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.4264804422855377},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3262186050415039},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2862545847892761},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.28302258253097534},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.25826460123062134},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18002259731292725},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10121071338653564},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09437832236289978}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7833927273750305},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7624112367630005},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.7020399570465088},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6870545148849487},{"id":"https://openalex.org/C2779965156","wikidata":"https://www.wikidata.org/wiki/Q5227350","display_name":"Data sharing","level":3,"score":0.6088050603866577},{"id":"https://openalex.org/C135530808","wikidata":"https://www.wikidata.org/wiki/Q3306713","display_name":"Key-agreement protocol","level":5,"score":0.575087308883667},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.572484016418457},{"id":"https://openalex.org/C2777513581","wikidata":"https://www.wikidata.org/wiki/Q5611239","display_name":"Group key","level":3,"score":0.5605040192604065},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5112295150756836},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4271278977394104},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.4264804422855377},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3262186050415039},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2862545847892761},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.28302258253097534},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.25826460123062134},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18002259731292725},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10121071338653564},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09437832236289978},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tdsc.2017.2725953","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2017.2725953","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30105235","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20835403","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Block_design-based_key_agreement_for_group_data_sharing_in_cloud_computing/20835403","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:researchbank.swinburne.edu.au:31c59190-eb2d-47a1-a518-9c9b09dd2b2e/1","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.3/453167","pdf_url":null,"source":{"id":"https://openalex.org/S4306401157","display_name":"Swinburne Research Bank (Swinburne University of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I57093077","host_organization_name":"Swinburne University of Technology","host_organization_lineage":["https://openalex.org/I57093077"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing, Vol. 16, no. 6 (Nov 2019), pp. 996-1010","raw_type":""}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20835403","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Block_design-based_key_agreement_for_group_data_sharing_in_cloud_computing/20835403","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2596279138","display_name":null,"funder_award_id":"U1405254","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4925959090","display_name":null,"funder_award_id":"61501333","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6295448653","display_name":null,"funder_award_id":"61373169","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8217645079","display_name":null,"funder_award_id":"61672295","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8938912181","display_name":null,"funder_award_id":"61572379","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320327518","display_name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W11738725","https://openalex.org/W1496476738","https://openalex.org/W1527077352","https://openalex.org/W1542908046","https://openalex.org/W1569083856","https://openalex.org/W1584737310","https://openalex.org/W1927099252","https://openalex.org/W1969897723","https://openalex.org/W1977251372","https://openalex.org/W1979946760","https://openalex.org/W2002898553","https://openalex.org/W2013252044","https://openalex.org/W2050373234","https://openalex.org/W2054701320","https://openalex.org/W2058477688","https://openalex.org/W2071940270","https://openalex.org/W2081636541","https://openalex.org/W2086042811","https://openalex.org/W2095494726","https://openalex.org/W2104748480","https://openalex.org/W2135654420","https://openalex.org/W2145426052","https://openalex.org/W2150010995","https://openalex.org/W2154205416","https://openalex.org/W2156186849","https://openalex.org/W2158347562","https://openalex.org/W2323162780","https://openalex.org/W2483379036","https://openalex.org/W2524195644","https://openalex.org/W2616646314","https://openalex.org/W6600488238","https://openalex.org/W6631511759","https://openalex.org/W6681871932","https://openalex.org/W6721764238","https://openalex.org/W6727100321"],"related_works":["https://openalex.org/W149131220","https://openalex.org/W2371743270","https://openalex.org/W2072671478","https://openalex.org/W4381328149","https://openalex.org/W2149353829","https://openalex.org/W2995210401","https://openalex.org/W1975706459","https://openalex.org/W2120969791","https://openalex.org/W2007025866","https://openalex.org/W2099222124"],"abstract_inverted_index":{"Data":[0],"sharing":[1,36,72,129,191],"in":[2,20,48,66,73,111,192],"cloud":[3,74,113,193],"computing":[4,194],"enables":[5,187],"multiple":[6,101,143],"participants":[7,110,170],"to":[8,30,42,116,195,203],"freely":[9],"share":[10,44],"the":[11,16,32,45,83,107,117,120,125,137,150,157,161,167,172,180,188],"group":[12,39,50,70,127,189],"data,":[13],"which":[14,103,200],"improves":[15],"efficiency":[17],"of":[18,34,82,109,119,160,169,184],"work":[19],"cooperative":[21],"environments":[22],"and":[23,40,68,171],"has":[24],"widespread":[25],"potential":[26],"applications.":[27],"However,":[28],"how":[29,41],"ensure":[31],"security":[33],"data":[35,47,71,128,190],"within":[37],"a":[38,49,62,92,112],"efficiently":[43],"outsourced":[46],"manner":[51],"are":[52],"formidable":[53],"challenges.":[54],"Note":[55,145],"that":[56,99,146],"key":[57,96,140,198],"agreement":[58,97],"protocols":[59],"have":[60],"played":[61],"very":[63],"important":[64],"role":[65],"secure":[67],"efficient":[69],"computing.":[75],"In":[76,178],"this":[77],"paper,":[78],"by":[79,147],"taking":[80],"advantage":[81],"symmetric":[84],"balanced":[85],"incomplete":[86],"block":[87,94,121],"design":[88],"(SBIBD),":[89],"we":[90,131],"present":[91,132],"novel":[93],"design-based":[95],"protocol":[98,163,186],"supports":[100],"participants,":[102],"can":[104],"flexibly":[105],"extend":[106],"number":[108,168],"environment":[114],"according":[115],"structure":[118],"design.":[122],"Based":[123],"on":[124],"proposed":[126,162],"model,":[130],"general":[133],"formulas":[134],"for":[135,142],"generating":[136],"common":[138],"conference":[139],"IC":[141],"participants.":[144],"benefiting":[148],"from":[149],"(v,":[151],"k":[152],"+":[153],"1,":[154],"1)-block":[155],"design,":[156],"computational":[158],"complexity":[159,174],"linearly":[164],"increases":[165],"with":[166],"communication":[173],"is":[175,201],"greatly":[176],"reduced.":[177],"addition,":[179],"fault":[181],"tolerance":[182],"property":[183],"our":[185],"withstand":[196],"different":[197],"attacks,":[199],"similar":[202],"Yi's":[204],"protocol.":[205]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":21},{"year":2024,"cited_by_count":40},{"year":2023,"cited_by_count":35},{"year":2022,"cited_by_count":50},{"year":2021,"cited_by_count":49},{"year":2020,"cited_by_count":27},{"year":2019,"cited_by_count":22},{"year":2018,"cited_by_count":39},{"year":2017,"cited_by_count":12}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
