{"id":"https://openalex.org/W3046188402","doi":"https://doi.org/10.1109/access.2020.3011965","title":"Securely and Efficiently Computing the Hermite Normal Form of Integer Matrices via Cloud Computing","display_name":"Securely and Efficiently Computing the Hermite Normal Form of Integer Matrices via Cloud Computing","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3046188402","doi":"https://doi.org/10.1109/access.2020.3011965","mag":"3046188402"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3011965","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09149568.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09149568.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103124631","display_name":"Zhao Wei","orcid":"https://orcid.org/0000-0002-5281-8483"},"institutions":[],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020719348","display_name":"Chengliang Tian","orcid":"https://orcid.org/0000-0002-2474-910X"},"institutions":[{"id":"https://openalex.org/I108688024","display_name":"Qingdao University","ror":"https://ror.org/021cj6z65","country_code":"CN","type":"funder","lineage":["https://openalex.org/I108688024"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chengliang Tian","raw_affiliation_strings":["Business School, Qingdao University, Qingdao, China","College of Computer Science and Technology, Qingdao University, Qingdao, China","State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Business School, Qingdao University, Qingdao, China","institution_ids":["https://openalex.org/I108688024"]},{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]},{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020366894","display_name":"Weizhong Tian","orcid":"https://orcid.org/0000-0002-7379-9285"},"institutions":[{"id":"https://openalex.org/I163113649","display_name":"Eastern New Mexico University","ror":"https://ror.org/02xag2b27","country_code":"US","type":"education","lineage":["https://openalex.org/I163113649"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weizhong Tian","raw_affiliation_strings":["Department of Mathematical Sciences, Eastern New Mexico University, Portales, USA"],"affiliations":[{"raw_affiliation_string":"Department of Mathematical Sciences, Eastern New Mexico University, Portales, USA","institution_ids":["https://openalex.org/I163113649"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100706791","display_name":"Yan Zhang","orcid":"https://orcid.org/0000-0002-5137-733X"},"institutions":[{"id":"https://openalex.org/I143413998","display_name":"Qingdao University of Science and Technology","ror":"https://ror.org/041j8js14","country_code":"CN","type":"funder","lineage":["https://openalex.org/I143413998"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhang","raw_affiliation_strings":["College of Electromechanical Engineering, Qingdao University of Science and Technology, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Electromechanical Engineering, Qingdao University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I143413998"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.472,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":5,"citation_normalized_percentile":{"value":0.786783,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":78,"max":80},"biblio":{"volume":"8","issue":null,"first_page":"137616","last_page":"137630"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9977,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11435","display_name":"Polynomial and algebraic computation","score":0.9944,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/unimodular-matrix","display_name":"Unimodular matrix","score":0.6086647}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.76545554},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7178322},{"id":"https://openalex.org/C201958917","wikidata":"https://www.wikidata.org/wiki/Q1367055","display_name":"Unimodular matrix","level":2,"score":0.6086647},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.46643496},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.4638989},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4591697},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.42588037},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.42258215},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.41601285},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.41593477},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40361944},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19306195},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.15631479},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.10953304},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3011965","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09149568.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/1fbf0309b3144f8aba41b0fe2043dcb4","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.3011965","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/09149568.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.55,"display_name":"Decent work and economic growth","id":"https://metadata.un.org/sdg/8"}],"grants":[{"funder":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China","award_id":"61702294"},{"funder":"https://openalex.org/F4320321133","funder_display_name":"Chinese Academy of Sciences","award_id":"2016-MS-23"}],"datasets":[],"versions":[],"referenced_works_count":57,"referenced_works":["https://openalex.org/W1484276943","https://openalex.org/W1496801598","https://openalex.org/W1571821840","https://openalex.org/W1582043969","https://openalex.org/W1601098769","https://openalex.org/W1630587103","https://openalex.org/W1798609567","https://openalex.org/W1881831204","https://openalex.org/W1963547452","https://openalex.org/W1975199330","https://openalex.org/W1980516015","https://openalex.org/W1981577150","https://openalex.org/W1985138225","https://openalex.org/W1997864729","https://openalex.org/W2007447217","https://openalex.org/W2014143000","https://openalex.org/W2015161630","https://openalex.org/W2032980094","https://openalex.org/W2037483935","https://openalex.org/W2053923031","https://openalex.org/W2062604685","https://openalex.org/W2093909024","https://openalex.org/W2097184218","https://openalex.org/W2120248756","https://openalex.org/W2132172731","https://openalex.org/W2141420453","https://openalex.org/W2143969840","https://openalex.org/W2153486647","https://openalex.org/W2166789519","https://openalex.org/W2170444562","https://openalex.org/W2239353921","https://openalex.org/W2250444211","https://openalex.org/W2308297356","https://openalex.org/W2394785274","https://openalex.org/W2398056013","https://openalex.org/W2477858045","https://openalex.org/W2731698263","https://openalex.org/W2774425664","https://openalex.org/W2793031414","https://openalex.org/W2794820965","https://openalex.org/W2887363919","https://openalex.org/W2900975904","https://openalex.org/W2940675737","https://openalex.org/W2946658425","https://openalex.org/W2947553656","https://openalex.org/W2951187092","https://openalex.org/W2952675638","https://openalex.org/W2961368373","https://openalex.org/W2970688133","https://openalex.org/W2980257992","https://openalex.org/W2982505181","https://openalex.org/W2997908480","https://openalex.org/W2999424232","https://openalex.org/W3005949189","https://openalex.org/W3026368930","https://openalex.org/W3028257350","https://openalex.org/W4213255380"],"related_works":["https://openalex.org/W4399217595","https://openalex.org/W4288849478","https://openalex.org/W3089223619","https://openalex.org/W2940752727","https://openalex.org/W2753007631","https://openalex.org/W211627054","https://openalex.org/W2088028898","https://openalex.org/W2011745869","https://openalex.org/W1974942973","https://openalex.org/W1561797008"],"abstract_inverted_index":{"The":[0,127],"prevalence":[1],"of":[2,14,44,56,64,82,97,193],"cloud":[3,125],"computing":[4,9,33],"greatly":[5],"promotes":[6],"the":[7,12,17,34,53,78,86,95,98,110,156,161,166,170,174,187,190,197,204],"traditional":[8],"paradigm.":[10],"With":[11],"assistance":[13],"a":[15,41,120,135],"cloud,":[16],"light-weight":[18],"device":[19],"can":[20],"achieve":[21],"computation-intensive":[22],"tasks":[23],"which":[24,39,151],"may":[25],"not":[26,47],"be":[27],"done":[28],"on":[29,141],"its":[30],"own.":[31],"While,":[32],"Hermite":[35],"Normal":[36],"Form":[37],"(HNF),":[38],"is":[40,49,134],"standard":[42],"form":[43],"integer":[45,72],"matrices,":[46],"only":[48],"inescapable":[50],"when":[51],"solving":[52],"linear":[54],"system":[55],"equations":[57],"over":[58],"integers,":[59],"but":[60],"also":[61],"has":[62],"lots":[63],"applications":[65],"in":[66,131],"many":[67],"other":[68],"fields,":[69],"such":[70],"as":[71,203],"programming":[73],"and":[74,102,147,164,182,189,196],"lattice-based":[75],"cryptography.":[76],"However,":[77],"fast":[79],"blowup":[80],"phenomenon":[81],"intermediate":[83],"numbers":[84],"makes":[85,152],"HNF":[87,100],"computation":[88,101,118],"time-consuming.":[89],"In":[90],"this":[91,116],"paper,":[92],"we":[93],"initialize":[94],"study":[96],"cloud-assisted":[99],"design":[103],"an":[104],"efficient":[105],"outsourcing":[106],"algorithm":[107,133,154],"that":[108],"enables":[109],"resource-constrained":[111],"client":[112,167],"to":[113,119,168],"securely":[114],"delegate":[115],"heavy":[117],"resource-abundant":[121],"yet":[122],"maybe":[123],"untrusted":[124],"server.":[126],"main":[128],"idea":[129],"involved":[130],"our":[132,153,194],"novel":[136],"matrix":[137,145,149],"encryption":[138],"method":[139],"based":[140],"random":[142],"permutation,":[143],"unimodular":[144],"transformation":[146],"triangular":[148],"transformation,":[150],"protect":[155],"client's":[157],"input/output":[158],"information":[159],"with":[160,173],"one-way":[162],"notion":[163],"enable":[165],"detect":[169],"cloud's":[171],"deception":[172],"optimal":[175],"probability":[176],"1.":[177],"Besides,":[178],"rigorous":[179],"theoretical":[180],"analysis":[181],"extensive":[183],"experimental":[184],"evaluation":[185],"validate":[186],"efficiency":[188],"practical":[191],"performance":[192],"design,":[195],"substantial":[198],"client-side":[199],"savings":[200],"are":[201],"remarkable":[202],"problem":[205],"size":[206],"increases.":[207]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3046188402","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2025-04-25T03:24:47.764722","created_date":"2020-08-03"}