{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T09:45:06Z","timestamp":1753868706574,"version":"3.41.2"},"reference-count":44,"publisher":"Wiley","issue":"22","license":[{"start":{"date-parts":[[2018,6,25]],"date-time":"2018-06-25T00:00:00Z","timestamp":1529884800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472091","61370194"],"award-info":[{"award-number":["61472091","61370194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012245","name":"Science and Technology Planning Project of Guangdong Province","doi-asserted-by":"publisher","award":["2015B010129015"],"award-info":[{"award-number":["2015B010129015"]}],"id":[{"id":"10.13039\/501100012245","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014717","name":"National Outstanding Youth Science Fund Project of National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61722203"],"award-info":[{"award-number":["61722203"]}],"id":[{"id":"10.13039\/100014717","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2019,11,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>Based on cloud servers' powerful storage and computing resources, users can store mass encrypted data in the cloud and outsource complex encryption computations to the cloud servers. Since cloud servers cannot be completely trusted, then data privacy and integrity are concerned about hot issues. We focus on the following problems in outsourced encryptions: how to protect the data privacy and how to check the integrity of data and the correctness of cloud server's outsourcing computations. In this paper, we at first propose a verifiable chaotic encryption based on Chebyshev polynomials. The scheme supports verifiable function for data integrity. To further improve the efficiency of the scheme, a corresponding outsourced encryption scheme is constructed, where the heavy overhead evaluations of Chebyshev polynomials are transferred from the user side to the cloud server. The outsourced encryption also provides the checkability for data integrity and correctness of cloud computations. The scheme is suitable for mobile users with limited computing resources. Moreover, the newly proposed scheme no longer depends upon the simple heuristic analysis. It achieves the indistinguishability under chosen\u2010ciphertext attacks (IND\u2010CCA) in the standard model based on the Chebyshev\u2010based Decisional Diffie\u2010Hellman (CDDH) assumption. Thus, we answer a long\u2010term open problem for building a chaotic encryption scheme with provable security in the sense of the IND\u2010CCA.<\/jats:p>","DOI":"10.1002\/cpe.4523","type":"journal-article","created":{"date-parts":[[2018,6,26]],"date-time":"2018-06-26T04:09:11Z","timestamp":1529986151000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Verifiable Chebyshev maps\u2010based chaotic encryption schemes with outsourcing computations in the cloud\/fog scenarios"],"prefix":"10.1002","volume":"31","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0288-7296","authenticated-orcid":false,"given":"Jing","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer Science Guangzhou University  Guangzhou China"}]},{"given":"Licheng","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Networking and Switching Technology Beijing University of Posts and Telecommunications  Beijing China"}]},{"given":"Lihua","family":"Wang","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology  Tokyo Japan"}]},{"given":"Xianmin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science Guangzhou University  Guangzhou China"}]},{"given":"Zhengan","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Computer Science Guangzhou University  Guangzhou China"}]},{"given":"Jin","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science Guangzhou University  Guangzhou China"}]}],"member":"311","published-online":{"date-parts":[[2018,6,25]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2366471"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2512870"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.05.031"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.08.007"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4257"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.180"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.12.020"},{"key":"e_1_2_8_10_1","unstructured":"GreenM HohenbergerS WatersB.Outsourcing the decryption of ABE ciphertexts. Paper presented at: USENIX Security Symposium;2011;San Francisco CA."},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.271"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.284"},{"key":"e_1_2_8_13_1","first-page":"1","article-title":"Privacy\u2010preserving outsourced classification in cloud computing","author":"Li P","year":"2017","journal-title":"Clust Comput"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2449264"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.1203"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3843"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2615098"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.100913.00195"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.2295802"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.250"},{"key":"e_1_2_8_21_1","article-title":"Twitter spam detection: survey of new approaches and comparative study","author":"Wu T","year":"2017","journal-title":"Comput Secur"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.070813.00285"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.04.009"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.02.006"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-013-0252-0"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.003"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.01.014"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00086-3"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/81.904880"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1304-6"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-014-1388-z"},{"issue":"3","key":"e_1_2_8_32_1","first-page":"37","article-title":"Chaos of the Chebyshev polynomials","volume":"19","author":"Jiang JC","year":"1996","journal-title":"Nat Sci J Xiangtan Univ"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00034-005-2403-x"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11071-015-2126-x"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chaos.2006.09.047"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_2_8_37_1","unstructured":"RackoffC SimonDR.Non\u2010interactive zero\u2010knowledge proof of knowledge and chosen ciphertext attack. Paper presented at: 1991 Annual International Cryptology Conference;1991;Santa Barbara CA."},{"key":"e_1_2_8_38_1","doi-asserted-by":"crossref","unstructured":"CramerR ShoupV.A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. Paper presented at: 1998 Annual International Cryptology Conference;1998;Santa Barbara CA.","DOI":"10.1007\/BFb0055717"},{"key":"e_1_2_8_39_1","doi-asserted-by":"crossref","unstructured":"BellareM RogawayP.Random oracles are practical: A paradigm for designing efficient protocols. Paper presented at: Proceedings of the 1st ACM Conference on Computer and Communications Security;1993;Fairfax VA.","DOI":"10.1145\/168588.168596"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2010.148"},{"key":"e_1_2_8_41_1","unstructured":"Q\u2010Q plot.https:\/\/en.wikipedia.org\/wiki\/Q-Q_plot"},{"key":"e_1_2_8_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/gcc-2013-0007"},{"key":"e_1_2_8_43_1","unstructured":"FeeG MonaganM.Cryptography using Chebyshev polynomials. Paper presented at: Proceedings of 2004 Maple Summer Workshop;2004;Burnaby Canada."},{"issue":"1","key":"e_1_2_8_44_1","first-page":"58","article-title":"Pitfalls in identity based encryption using extended Chebyshev polynomial","volume":"9","author":"Haifeng Q","year":"2012","journal-title":"China Commun"},{"key":"e_1_2_8_45_1","unstructured":"ECRYPT II.Yearly report on algorithms and keysizes [Technical report].2012."}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.4523","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.4523","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/cpe.4523","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.4523","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T14:58:01Z","timestamp":1693666681000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.4523"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,25]]},"references-count":44,"journal-issue":{"issue":"22","published-print":{"date-parts":[[2019,11,25]]}},"alternative-id":["10.1002\/cpe.4523"],"URL":"https:\/\/doi.org\/10.1002\/cpe.4523","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2018,6,25]]},"assertion":[{"value":"2017-12-16","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-03-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e4523"}}