{“状态”:“正常”,“消息类型”:“工作”,“消息版本”:“1.0.0”,“消息”:{“索引”:{“日期部分”:[[2024,8,7]],“日期时间”:“2024-08-07T07:54:58Z”,“时间戳”:1723017298362},“引用计数”:32,“发布者”:“电气和电子工程师协会(IEEE)”,“问题”:“3”,“许可证”:[{“开始”:{“日期部分”:[[2018,7,1]],“日期时间”:“2018-07-01T00:00:00Z”,“timestamp”:1530403200000},“content-version”:“vor”,“delay-in-days”:0,“URL”:“https:\/\/ieeexplore.iee.org\/Xplorehelp\/downloads\/license-information\/ieee.html”}],“funder”:[{“name”:“JSPS KAKENHI”,“award”:[“26730056”]},{“name”:“JPS A3 Foresight Program”}],“content-domain”:{“域”:[],“交叉标记限制”:false},“short-container-title”:[“IEEE Trans.Cloud Compute.”],“published-print”:{“date-parts”:[[2018,7,1]]},“DOI”:“10.1109\/tcc.2015.2511769”,“type”:“journal-article”,“created”:{“date-parts”:[2015,12,23]],“date-time”:“2015-12-23T19:06:06Z”referenced-by-count“:27,”标题“:[“使用完全同态加密方案的安全张量分解”],“前缀”:“10.1109”,“卷”:“6”,“作者”:[{“给定”:“Liwei”,“家族”:“Kuang”,”sequence“:”first“,”affiliation“:[]},{“ORCID”:“http://\/ORCID.org\/00000-0002-7986-4244”,“authenticated-ORCID”:false,“给定”:“Laurence T”,“family”:“Yang”,“sequence”:“additional”,“affiliance”:[]{,{“give”:“Jun”,“family”:“Feng”,“sequence”:“additional”,“affiliation”:[]},{“ORCID”:“http://\/ORCID.org\/00000-0002-2788-3451”,“authenticated-ORCID”:false,“given”:”棉雄“,“faily”:”Dong“,”sequence“:”additional“,”affiliation:[]}],“member”:“263”,“reference”:[{“key”:“ref32”,“doi-asserted-by”::“publisher”,“doi”:“10.1137\/11085935X”},{“键”:“参考31”,“doi-asserted-by”:“publisher”,“doi”:“10.1137\/080733383”},{“key”:“ref30”,“first page”:”1“,”author“:”popovyan“,”year“:”2011“},“{”key“:”ref10“,”doi-assert-by“:”publisher“,n个整数“,”author“:”van dijk“,”year“:”0“,“journal-title”:“Proc-Adv-Cryptol”},{“key”:“ref12”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/2090236.2090262”}、{“密钥”:“ref13”,“doi-asserte-by”:“publisher”、“doi“:”10.1137\/1.9780898719192“},{”key“:”ref15“,”doi-asserted-by“:”publisher“,”doi“:“10.1137\/1.9780898719581”},{“key”:“ref16”,“author”:“lambert”,“year”:“1997”,“journal-title”:“离散对数的计算方面”}计算“},{”key“:”ref19“,”doi-asserted-by“:“publisher”,“DOI”:“10.1137\/1.9780898719512”},{“key”:“ref28”,“DOI-asserted-by”:“publicher”,“DOI”:”10.1109\/FOCS.2011.94“},}“key”:”ref4“,”DOI-assert-by“:”publisher“,”DOI“:”10.1002\/978111189145“10.1007\/978-3-540-30576-7_18”,“文章标题”:“在密文上评估2-DNF公式”,“author”:“boneh”,“year”:“2005”,“journal-title”:“密码学理论”},{“key”:“ref3”,“作者”:“han”,“年份”:“2006”,“日记标题”:“数据挖掘东南亚版概念和技术”}“”:“420”,“article-title”:“密钥和密文大小相对较小的完全同态加密”,“author”:“smart”,”year“:”2010“,”journal-title“:”Proc Public key Cryptography“},{“key”:“ref5”,“first-page:”169“,”article-title“:”On data banks and privacy homorphismis“,”volume“:”4“,”author“:”rivest“,”year:“1978”,“journal-title”:“Found Secure Compute”},{“key”:“ref8”,“doi-asserted-by”:“publisher”,“doi”:“10.1137\/07070111X”}aten”,“年份”:“2009年”,“新闻标题”:“J Mach Learn Res”},{“key”:“ref9”,“doi-asserted-by”:“publisher”,“doi”:“10.1109\/TETC.2014.2330516”}“0”,“日记标题”:“Proc Tensor分解研讨会”},{“key”:“ref22”,“doi-asserted-by”:“publisher”,“doi”:“10.1145\/359340.359342”}23“,”doi-asserted-by“:”publisher“,”doi“:”10.1145\/800070.802212“},{“key”:“ref26”,“doi-asserted-by”:“publisher”,“doi”:“10.1007\/3-540-48910-X_16”},{“key”:”ref25“,”doi-assert-by“:”publisher“,”doi“:”10.1109\/SFCS.1985.2“}],”container-title“:[“IEEE云计算事务”],“original-title”:[],“link”:[{“URL”:“http://explorestaging.IEEE.org\/ielx7\/6245 519 \/8453982 \/07364235.pdf?arnumber=7364235“,“content-type”:“unspecified”,“content-version”:“vor”,“intended-application”:“similarity-checking”}],“deposed”:{“date-parts”:[2022,1,26]],“date-time”:”2022-01-26T11:21:33Z“,”timestamp“:1643196093000},“score”:1,“resource”:{primary“:{”URL“https:\/\ieeeexplore.iee.org\/document\/7364235\/“}}”,“subtittle”:[],“shorttitle”:[],“issued”:{“date-parts”用法:[[2018,7,1]]},“references-count”:32,“journal-issue”:{“issue”:“3”}“}],”主题“:[],”发布“:{”日期部分“:[[2018,7,1]]}}}