{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:51:20Z","timestamp":1743079880974,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441959058"},{"type":"electronic","value":"9781441959065"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-1-4419-5906-5_914","type":"book-chapter","created":{"date-parts":[[2011,10,27]],"date-time":"2011-10-27T13:52:10Z","timestamp":1319723530000},"page":"1088-1093","source":"Crossref","is-referenced-by-count":4,"title":["Search over Encrypted Data"],"prefix":"10.1007","author":[{"given":"Ali","family":"Bagherzandi","sequence":"first","affiliation":[]},{"given":"Bijit","family":"Hore","sequence":"additional","affiliation":[]},{"given":"Sharad","family":"Mehrotra","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"914_CR1_914","volume-title":"Proceedings of IEEE symposium on foundations of computer science","author":"B Chor","year":"1995","unstructured":"Chor B, Goldreich O, Kushilevitz E, Sudan M (1995) Private information retrieval. In: Proceedings of IEEE symposium on foundations of computer science"},{"key":"914_CR2_914","volume-title":"Proceedings of IEEE SRSP","author":"D Song","year":"2000","unstructured":"Song D, Wagner D, Perrig A (2000) Search on encrypted data. In: Proceedings of IEEE SRSP"},{"key":"914_CR3_914","volume-title":"International conference on very large databases (VLDB)","author":"B Hore","year":"2004","unstructured":"Hore B, Mehrotra S, Tsudik G (2004) A privacy-preserving index for range queries. In: International conference on very large databases (VLDB), Toronto"},{"key":"914_CR4_914","volume-title":"ACM conference on computer and communications security","author":"R Curtmola","year":"2006","unstructured":"Curtmola R, Garay JA, Kamara S, Ostrovsky R (2006) Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM conference on computer and communications security, Alexandria"},{"key":"914_CR5_914","volume-title":"Fully homomorphic encryption using ideal lattices","author":"C Gentry","year":"2009","unstructured":"Gentry C (2009) Fully homomorphic encryption using ideal lattices. In: STOC, Betheseda"},{"issue":"3","key":"914_CR6_914","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1145\/233551.233553","volume":"43","author":"O Goldreich","year":"1996","unstructured":"Goldreich O, Ostrovsky R (1996) Software protection and simulation on oblivious RAMs. J ACM 43(3):431\u2013473","journal-title":"J ACM"},{"key":"914_CR7_914","volume-title":"Predicate privacy in encryption systems","author":"E Shen","year":"2009","unstructured":"Shen E, Shi E, Waters B (2009) Predicate privacy in encryption systems. In TCC, San Francisco"},{"issue":"3","key":"914_CR8_914","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M Abdalla","year":"2008","unstructured":"Abdalla M, Bellare M, Catalano D, Kiltz E, Kohno T, Lange T, Malone-Lee J, Neven G, Paillier P, Shi H (2008) Searchable encryption revisited: consistency properties, relation to anonymous IBE, and extensions. J Cryptol 21(3): 350\u2013391","journal-title":"J Cryptol"},{"doi-asserted-by":"crossref","unstructured":"Boldyreva A, Chenette N, Lee Y, O\u2019Neill A (2009) Order-preserving symmetric encryption. In: EUROCRYPT","key":"914_CR9_914","DOI":"10.1007\/978-3-642-01001-9_13"}],"container-title":["Encyclopedia of Cryptography and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-5906-5_914","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,2]],"date-time":"2020-06-02T00:12:21Z","timestamp":1591056741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-5906-5_914"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9781441959058","9781441959065"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-5906-5_914","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}