{"id":"https://openalex.org/W2787567818","doi":"https://doi.org/10.1142/s0129054117400196","title":"Confidentiality-Preserving Publicly Verifiable Computation","display_name":"Confidentiality-Preserving Publicly Verifiable Computation","publication_year":2017,"publication_date":"2017-09-01","ids":{"openalex":"https://openalex.org/W2787567818","doi":"https://doi.org/10.1142/s0129054117400196","mag":"2787567818"},"language":"en","primary_location":{"id":"doi:10.1142/s0129054117400196","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054117400196","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052684370","display_name":"Jiameng Sun","orcid":"https://orcid.org/0000-0003-3153-7698"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiameng Sun","raw_affiliation_strings":["School of Mathematics, Shandong University, Jinan, Shandong, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, Shandong, P. R. China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5081311057","display_name":"Binrui Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Binrui Zhu","raw_affiliation_strings":["School of Mathematics, Shandong University, Jinan, Shandong, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, Shandong, P. R. China","institution_ids":["https://openalex.org/I154099455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091403237","display_name":"Jing Qin","orcid":"https://orcid.org/0000-0003-2380-0396"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Qin","raw_affiliation_strings":["School of Mathematics, Shandong University, Jinan, Shandong, P. R. China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Mathematics, Shandong University, Jinan, Shandong, P. R. China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, P. R. China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075234257","display_name":"Jiankun Hu","orcid":"https://orcid.org/0000-0003-0230-1432"},"institutions":[{"id":"https://openalex.org/I40053085","display_name":"Australian Defence Force Academy","ror":"https://ror.org/02j5s7g39","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571","https://openalex.org/I40053085","https://openalex.org/I4394709116"]},{"id":"https://openalex.org/I31746571","display_name":"UNSW Sydney","ror":"https://ror.org/03r8z3t63","country_code":"AU","type":"education","lineage":["https://openalex.org/I31746571"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jiankun Hu","raw_affiliation_strings":["School of Engineering and Information Technology, University of New South Wales Defence Force Academy, Canberra, Australia"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Information Technology, University of New South Wales Defence Force Academy, Canberra, Australia","institution_ids":["https://openalex.org/I40053085","https://openalex.org/I31746571"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022955566","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0002-6407-4194"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["School of Electronics and Information Engineering, Beihang University, Beijing 100083, P. R. China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Information Engineering, Beihang University, Beijing 100083, P. R. China","institution_ids":["https://openalex.org/I82880672"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5052684370"],"corresponding_institution_ids":["https://openalex.org/I154099455"],"apc_list":null,"apc_paid":null,"fwci":0.9751,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.82967354,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"28","issue":"06","first_page":"799","last_page":"818"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8030939102172852},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.7900264263153076},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.7760049104690552},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.7441574931144714},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6884053945541382},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.6389287710189819},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6245328187942505},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5090174674987793},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4923352003097534},{"id":"https://openalex.org/keywords/computational-complexity-theory","display_name":"Computational complexity theory","score":0.4912986159324646},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.467507928609848},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4391682744026184},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4176270067691803},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.14254096150398254},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11173173785209656},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.07329559326171875},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.06428247690200806}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8030939102172852},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.7900264263153076},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.7760049104690552},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.7441574931144714},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6884053945541382},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.6389287710189819},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6245328187942505},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5090174674987793},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4923352003097534},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.4912986159324646},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.467507928609848},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4391682744026184},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4176270067691803},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.14254096150398254},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11173173785209656},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.07329559326171875},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.06428247690200806},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1142/s0129054117400196","is_oa":false,"landing_page_url":"https://doi.org/10.1142/s0129054117400196","pdf_url":null,"source":{"id":"https://openalex.org/S68047077","display_name":"International Journal of Foundations of Computer Science","issn_l":"0129-0541","issn":["0129-0541","1793-6373"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319815","host_organization_name":"World Scientific","host_organization_lineage":["https://openalex.org/P4310319815"],"host_organization_lineage_names":["World Scientific"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Foundations of Computer Science","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W2093909024","https://openalex.org/W2114486350","https://openalex.org/W3207853298"],"related_works":["https://openalex.org/W4387497383","https://openalex.org/W3183948672","https://openalex.org/W3173606202","https://openalex.org/W3110381201","https://openalex.org/W2948807893","https://openalex.org/W2935909890","https://openalex.org/W2778153218","https://openalex.org/W2758277628","https://openalex.org/W1531601525","https://openalex.org/W2031284701"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,12],"enables":[2],"users":[3,17],"to":[4,9,51,60,81,88,98,103,120,126,135,210],"outsource":[5,99],"complicated":[6],"computational":[7,58,66,101,124,132,180],"tasks":[8,67],"a":[10,76,94,100,104,150,204],"commercial":[11],"server":[13,40,106],"and":[14,20,129,188,206],"relieves":[15],"the":[16,29,35,39,57,91,111,118,122,131,138,143,194],"from":[18],"establishing":[19],"maintaining":[21],"expensive":[22],"local":[23],"computation":[24,46,86],"systems.":[25],"In":[26],"this":[27,53],"scenario,":[28],"minimum":[30],"security":[31,78],"requirement":[32],"is":[33,163,189],"that":[34,65,175],"result":[36,59,133,181],"returned":[37],"by":[38,55],"must":[41],"be":[42,61],"correct.":[43],"Publicly":[44],"verifiable":[45,85],"(PVC)":[47],"has":[48],"been":[49],"proposed":[50],"address":[52,90],"issue":[54],"allowing":[56],"publicly":[62,84],"verifiable.":[63],"Observing":[64],"are":[68,169],"usually":[69],"private":[70],"business":[71],"in":[72],"practice,":[73],"we":[74],"propose":[75,149],"confidentiality-preserving":[77,83],"tool":[79,209],"referred":[80],"as":[82,165,191,193,203],"(CP-PVC),":[87],"efficiently":[89],"scenario":[92],"where":[93],"client":[95,119],"would":[96],"like":[97],"task":[102,125],"cloud":[105,212],"but":[107],"does":[108],"not":[109,141],"possess":[110],"input":[112],"value":[113],"locally.":[114],"The":[115],"CP-PVC":[116,151,177,202],"allows":[117],"delegate":[121],"outsourcing":[123],"anyone":[127,136],"authorized":[128],"keeps":[130],"confidential":[134],"except":[137],"client,":[139],"while":[140],"sacrificing":[142],"property":[144],"of":[145],"public":[146],"verifiability.":[147],"We":[148],"construction":[152,162],"based":[153],"on":[154],"any":[155,184],"one-key":[156,171],"secure":[157,211],"attribute-based":[158],"encryption":[159],"(ABE).":[160],"Our":[161],"general":[164],"known":[166],"ABE":[167],"schemes":[168],"all":[170],"secure.":[172],"Analysis":[173],"shows":[174],"our":[176,201],"scheme":[178],"achieves":[179],"privacy":[182],"without":[183],"significant":[185],"extra":[186],"cost":[187],"almost":[190],"efficient":[192],"up-to-date":[195],"PVC":[196],"schemes.":[197],"These":[198],"features":[199],"render":[200],"practical":[205],"widely":[207],"applicable":[208],"computing.":[213]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
