{"id":"https://openalex.org/W4366967450","doi":"https://doi.org/10.1109/tifs.2023.3269669","title":"A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform","display_name":"A Privacy-Preserving and Verifiable Statistical Analysis Scheme for an E-Commerce Platform","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4366967450","doi":"https://doi.org/10.1109/tifs.2023.3269669"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2023.3269669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3269669","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021119779","display_name":"Hua Shen","orcid":"https://orcid.org/0000-0001-8409-0960"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Hua Shen","raw_affiliation_strings":["School of Computer Science, Hubei University of Technology (HBUT), Wuhan, Hubei, China","Xiangyang Industrial Institute of Hubei University of Technology, Xiangyang, Hubei, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, Guangxi, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hubei University of Technology (HBUT), Wuhan, Hubei, China","institution_ids":["https://openalex.org/I74525822"]},{"raw_affiliation_string":"Xiangyang Industrial Institute of Hubei University of Technology, Xiangyang, Hubei, China","institution_ids":["https://openalex.org/I74525822"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084386464","display_name":"Ge Wu","orcid":"https://orcid.org/0000-0001-6569-1787"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ge Wu","raw_affiliation_strings":["School of Cyber Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083800827","display_name":"Zhe Xia","orcid":"https://orcid.org/0000-0003-4397-1248"},"institutions":[{"id":"https://openalex.org/I196699116","display_name":"Wuhan University of Technology","ror":"https://ror.org/03fe7t173","country_code":"CN","type":"education","lineage":["https://openalex.org/I196699116"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhe Xia","raw_affiliation_strings":["School of Computer Science and Technology, Wuhan University of Technology (WHUT), Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Wuhan University of Technology (WHUT), Wuhan, China","institution_ids":["https://openalex.org/I196699116"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054741725","display_name":"Willy Susilo","orcid":"https://orcid.org/0000-0002-1562-5105"},"institutions":[{"id":"https://openalex.org/I204824540","display_name":"University of Wollongong","ror":"https://ror.org/00jtmb277","country_code":"AU","type":"education","lineage":["https://openalex.org/I204824540"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Willy Susilo","raw_affiliation_strings":["Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Institute of Cybersecurity and Cryptology, School of Computing and Information Technology, University of Wollongong, Wollongong, NSW, Australia","institution_ids":["https://openalex.org/I204824540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077290356","display_name":"Mingwu Zhang","orcid":"https://orcid.org/0000-0001-8551-8826"},"institutions":[{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]},{"id":"https://openalex.org/I74525822","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342","country_code":"CN","type":"education","lineage":["https://openalex.org/I74525822"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingwu Zhang","raw_affiliation_strings":["School of Computer Science, Hubei University of Technology (HBUT), Wuhan, Hubei, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, Guangxi, China","Xiangyang Industrial Institute of Hubei University of Technology, Xiangyang, Hubei, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Hubei University of Technology (HBUT), Wuhan, Hubei, China","institution_ids":["https://openalex.org/I74525822"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, Guangxi, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Xiangyang Industrial Institute of Hubei University of Technology, Xiangyang, Hubei, China","institution_ids":["https://openalex.org/I74525822"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5021119779"],"corresponding_institution_ids":["https://openalex.org/I5343935","https://openalex.org/I74525822"],"apc_list":null,"apc_paid":null,"fwci":3.648,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.94281502,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"18","issue":null,"first_page":"2637","last_page":"2652"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8397778868675232},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7939174175262451},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.7279601097106934},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6898306608200073},{"id":"https://openalex.org/keywords/secret-sharing","display_name":"Secret sharing","score":0.6722913384437561},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6605714559555054},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.6559513807296753},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.6252908706665039},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6189385652542114},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.587846040725708},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.580491840839386},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5790480375289917},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.46409931778907776},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.46055424213409424},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45138201117515564},{"id":"https://openalex.org/keywords/e-commerce","display_name":"E-commerce","score":0.4338285028934479},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3016243577003479},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.21111804246902466},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.11529266834259033},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09006467461585999}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8397778868675232},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7939174175262451},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.7279601097106934},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6898306608200073},{"id":"https://openalex.org/C3087436","wikidata":"https://www.wikidata.org/wiki/Q1386603","display_name":"Secret sharing","level":3,"score":0.6722913384437561},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6605714559555054},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.6559513807296753},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.6252908706665039},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6189385652542114},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.587846040725708},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.580491840839386},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5790480375289917},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.46409931778907776},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.46055424213409424},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45138201117515564},{"id":"https://openalex.org/C78597825","wikidata":"https://www.wikidata.org/wiki/Q484847","display_name":"E-commerce","level":2,"score":0.4338285028934479},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3016243577003479},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.21111804246902466},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.11529266834259033},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09006467461585999},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2023.3269669","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2023.3269669","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/27807525","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:ro.uow.edu.au:test2021-14064","is_oa":false,"landing_page_url":"https://doi.org/10.1109/TIFS.2023.3269669","pdf_url":null,"source":{"id":"https://openalex.org/S4306400510","display_name":"Research Online (University of Wollongong)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I204824540","host_organization_name":"University of Wollongong","host_organization_lineage":["https://openalex.org/I204824540"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Scopus Harvesting Series","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/27807525","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","score":0.4399999976158142,"display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G1466251064","display_name":null,"funder_award_id":"BK20200391","funder_id":"https://openalex.org/F4320322769","funder_display_name":"Natural Science Foundation of Jiangsu Province"},{"id":"https://openalex.org/G1680200430","display_name":null,"funder_award_id":"61702168","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2343523931","display_name":null,"funder_award_id":"XJ2021000901","funder_id":"https://openalex.org/F4320321604","funder_display_name":"Hubei University of Technology"},{"id":"https://openalex.org/G2537888231","display_name":null,"funder_award_id":"U2001205","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3095015859","display_name":null,"funder_award_id":"62002058","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3318292942","display_name":null,"funder_award_id":"62072134","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G477844411","display_name":null,"funder_award_id":"2019JJD170020","funder_id":"https://openalex.org/F4320322768","funder_display_name":"Natural Science Foundation of Guangxi Province"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321604","display_name":"Hubei University of Technology","ror":"https://ror.org/02d3fj342"},{"id":"https://openalex.org/F4320322768","display_name":"Natural Science Foundation of Guangxi Province","ror":null},{"id":"https://openalex.org/F4320322769","display_name":"Natural Science Foundation of Jiangsu Province","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W1529862094","https://openalex.org/W1557783852","https://openalex.org/W1798609567","https://openalex.org/W1888254701","https://openalex.org/W2027423568","https://openalex.org/W2055817410","https://openalex.org/W2056993901","https://openalex.org/W2078590992","https://openalex.org/W2096061688","https://openalex.org/W2096123210","https://openalex.org/W2108834246","https://openalex.org/W2109426455","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2156962537","https://openalex.org/W2177209050","https://openalex.org/W2326245332","https://openalex.org/W2476633880","https://openalex.org/W2479818511","https://openalex.org/W2575938897","https://openalex.org/W2610479618","https://openalex.org/W2611401289","https://openalex.org/W2789659149","https://openalex.org/W2809641286","https://openalex.org/W2900854145","https://openalex.org/W2905068761","https://openalex.org/W2921072606","https://openalex.org/W2939009167","https://openalex.org/W2982234047","https://openalex.org/W2993670002","https://openalex.org/W2997823310","https://openalex.org/W3015172746","https://openalex.org/W3028493102","https://openalex.org/W3036075578","https://openalex.org/W3047624045","https://openalex.org/W3090278254","https://openalex.org/W3118383391","https://openalex.org/W3121113880","https://openalex.org/W3127041729","https://openalex.org/W3155748624","https://openalex.org/W3190283749","https://openalex.org/W4213444624","https://openalex.org/W4283032639","https://openalex.org/W4312884465","https://openalex.org/W6633565253","https://openalex.org/W6838789457"],"related_works":["https://openalex.org/W4316659877","https://openalex.org/W2768332800","https://openalex.org/W2006088653","https://openalex.org/W2083084382","https://openalex.org/W2607647996","https://openalex.org/W3035389378","https://openalex.org/W2357909631","https://openalex.org/W1540514112","https://openalex.org/W2363629235","https://openalex.org/W3001342270"],"abstract_inverted_index":{"To":[0],"know":[1],"the":[2,15,54,58,117,144,167,171,227,257,262,266,273,280],"most":[3,23],"recent":[4,24],"market":[5,25,32],"conditions,":[6],"an":[7,62,78,189],"e-commerce":[8,63,190],"platform":[9,64,191,258],"needs":[10,136],"to":[11,29,37,52,74,90,109,115,129,139,174,243],"be":[12],"aware":[13],"of":[14,18,61,268,276],"sales":[16,55,59,87,248],"situation":[17],"its":[19],"sellers\u2019":[20],"commodities.":[21],"The":[22,293],"conditions":[26],"can":[27,259],"help":[28,267],"forecast":[30],"future":[31],"trends":[33],"and":[34,125,183,254,290,303],"develop":[35],"policies":[36],"guide":[38],"sellers":[39,82],"in":[40,97],"reasonably":[41],"allocating":[42],"their":[43,86],"inventory":[44],"proportion.":[45],"Statistical":[46],"analysis":[47,73,158,186,263],"is":[48,77,122,149,212,296],"a":[49,67,123,150,181,194,200,220,240],"fundamental":[50],"approach":[51],"studying":[53],"situation.":[56],"However,":[57,134],"data":[60,88,132,157,249],"usually":[65,163],"has":[66,239],"significant":[68],"volume.":[69],"Therefore,":[70],"outsourcing":[71],"statistical":[72,185],"cloud":[75,104,270],"servers":[76],"effective":[79],"method.":[80],"Nevertheless,":[81,160],"do":[83,164],"not":[84,165],"want":[85],"leaked":[89],"anyone":[91],"or":[92,112],"any":[93,252],"other":[94,145,177],"organization.":[95],"Moreover,":[96],"many":[98],"circumstances,":[99],"we":[100,107],"cannot":[101],"fully":[102],"trust":[103],"servers.":[105],"Thus,":[106],"need":[108],"utilize":[110],"cryptographic":[111,152],"non-cryptographic":[113,127],"tools":[114],"realize":[116,130],"above":[118],"outsourcing.":[119],"Secret":[120],"sharing":[121,197,224],"lightweight":[124],"powerful":[126,151],"tool":[128,153],"privacy-preserving":[131,156,182],"analysis.":[133],"it":[135],"secure":[137,210],"channels":[138,211],"distribute":[140],"secret":[141,196,223,234],"shares.":[142,235],"On":[143],"hand,":[146],"homomorphic":[147,203],"encryption":[148,204],"for":[154,188,209,232],"designing":[155],"schemes.":[159],"these":[161],"schemes":[162],"allow":[166],"entity":[168],"that":[169,192,256],"holds":[170],"decryption":[172],"key":[173],"collude":[175],"with":[176,199,219,265],"entities.":[178],"We":[179],"propose":[180],"verifiable":[184,201],"scheme":[187,198],"combines":[193],"threshold":[195,202,222],"scheme.":[205],"Our":[206],"solution\u2019s":[207],"demand":[208],"reduced":[213],"by":[214],"40%":[215],"~":[216],"60%":[217],"compared":[218],"traditional":[221],"scheme,":[225],"thanking":[226],"designed":[228],"novel":[229,281],"distribution":[230],"model":[231,283],"delivering":[233],"Furthermore,":[236],"our":[237,285],"solution":[238,286,295],"stronger":[241],"ability":[242],"resist":[244],"collusive":[245],"attacks,":[246],"keep":[247],"private":[250],"from":[251],"entity,":[253],"ensure":[255],"only":[260],"obtain":[261],"results":[264],"some":[269],"servers,":[271],"alleviating":[272],"single":[274],"point":[275],"trust.":[277],"And":[278],"meanwhile,":[279],"distributed":[282],"makes":[284],"enjoy":[287],"better":[288],"robustness":[289],"fault":[291],"tolerance.":[292],"proposed":[294],"validated":[297],"through":[298],"security":[299],"analyses,":[300],"performance":[301],"evaluations,":[302],"comparison":[304],"analyses.":[305]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":2}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
