{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T17:10:02Z","timestamp":1746119402455,"version":"3.40.4"},"publisher-location":"New York, NY","reference-count":22,"publisher":"Springer New York","isbn-type":[{"type":"print","value":"9781461492771"},{"type":"electronic","value":"9781461492788"}],"license":[{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,12,7]],"date-time":"2013-12-07T00:00:00Z","timestamp":1386374400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-1-4614-9278-8_8","type":"book-chapter","created":{"date-parts":[[2014,1,23]],"date-time":"2014-01-23T08:28:40Z","timestamp":1390465720000},"page":"171-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Making Query Execution Over Encrypted Data Practical"],"prefix":"10.1007","author":[{"given":"Ken","family":"Smith","sequence":"first","affiliation":[]},{"given":"M. David","family":"Allen","sequence":"additional","affiliation":[]},{"given":"Hongying","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Sillers","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,7]]},"reference":[{"key":"8_CR1","unstructured":"ACM, Test of time award, www.sigmod.org\/2012\/awards_sigmod.shtml, 2012."},{"key":"8_CR2","first-page":"563","volume":"2004","author":"Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu, Order preserving encryption for numeric data, Proceedings of the","year":"2004","unstructured":"Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu, Order preserving encryption for numeric data, Proceedings of the 2004 ACM SIGMOD international conference on Management of data (New York, NY, USA), SIGMOD \u201904, ACM, 2004, pp.\u00a0563\u2013574.","journal-title":"ACM"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O\u2019Neill, Order-preserving symmetric encryption, Advances in Cryptology \u2013 EUROCRYPT 2009 (Antoine Joux, ed.), Lecture Notes in Computer Science, vol. 5479, Springer Berlin Heidelberg, 2009, pp.\u00a0224\u2013241.","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"8_CR4","unstructured":"DARPA, The darpa program for programming comuptation on encrypted data (proceed), http:\/\/www.darpa.mil\/Our_Work\/I2O\/Programs\/, 2013."},{"key":"8_CR5","volume-title":"A survey of homomorphic encryption for nonspecialists, EURASIP Journal on Information Security 1","author":"Caroline Fontaine","year":"2007","unstructured":"Caroline Fontaine and Fabien Galand, A survey of homomorphic encryption for nonspecialists, EURASIP Journal on Information Security 1 (2007)."},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Craig Gentry, A fully homomorphic encryption scheme, Ph.D. thesis, Stanford University, 2009.","DOI":"10.1145\/1536414.1536440"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Craig Gentry and Shai Halevi, Implementing gentry\u2019s fully-homomorphic encryption scheme, Advances in Cryptology \u2013 EUROCRYPT 2011 (KennethG. Paterson, ed.), Lecture Notes in Computer Science, vol. 6632, Springer Berlin Heidelberg, 2011, pp.\u00a0129\u2013148.","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Hakan Hacig\u00fcm\u00fc\u015f, Bala Iyer, Chen Li, and Sharad Mehrotra, Executing sql over encrypted data in the database-service-provider model, Proceedings of ACM SIGMOD (New York, NY, USA), SIGMOD \u201902, ACM, 2002, pp.\u00a0216\u2013227.","DOI":"10.1145\/564691.564717"},{"key":"8_CR9","unstructured":"IBM, Ibm homomorphic encryption library project on github, https:\/\/github.com\/shaih\/HElib, 2013."},{"key":"8_CR10","unstructured":"Intel, Intel advanced encryption standard instructions (aes-ni), http:\/\/software.intel.com \/en-us\/articles\/intel-advanced-encryption-standard-instructions-aes-ni\/, 2011."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Witold Litwin, Sushil Jajodia, and Thomas Schwarz, Privacy of data outsourced to a cloud for selected readers through client-side encryption, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society (New York, NY, USA), WPES \u201911, ACM, 2011, pp.\u00a0171\u2013176.","DOI":"10.1145\/2046556.2046580"},{"key":"8_CR12","volume-title":"Handbook of applied cryptography","author":"A.J. Menezes","year":"2010","unstructured":"A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of applied cryptography, Discrete Mathematics and Its Applications, Taylor & Francis, 2010."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Michael Naehrig, Kristin Lauter, and Vinod Vaikuntanathan, Can homomorphic encryption be practical?, Proceedings of the 3rd ACM workshop on Cloud computing security workshop (New York, NY, USA), ACM, 2011, pp.\u00a0113\u2013124.","DOI":"10.1145\/2046660.2046682"},{"key":"8_CR14","unstructured":"Oracle, Oracle advanced security transparent data encryption best practices, http:\/\/www.oracle.com\/technetwork\/database\/security\/twp-transparent-data-encryption-bes-130696.pdf, March 2012."},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume":"1592","author":"Pascal Paillier","year":"1999","unstructured":"Pascal Paillier, Public-key cryptosystems based on composite degree residuosity classes, Advances in Cryptology (EUROCRYPT \u201999), Lecture Notes in Computer Science 1592 (1999), 223\u2013238.","journal-title":"Lecture Notes in Computer Science"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Raluca\u00a0Ada Popa, Catherine M.\u00a0S. Redfield, Nickolai Zeldovich, and Hari Balakrishnan, Cryptdb: protecting confidentiality with encrypted query processing, Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles (New York, NY, USA), SOSP \u201911, ACM, 2011, pp.\u00a085\u2013100.","DOI":"10.1145\/2043556.2043566"},{"key":"8_CR17","unstructured":"Reuters, German state ready to buy stolen bank data source, blogs.reuters.com\/financial-regulatory-forum\/2010\/02\/04\/german-state-ready-to-buy-stolen-bank-data-source\/, 2010."},{"key":"8_CR18","unstructured":"Amazon\u00a0Web Services, products page, aws.amazon.com\/products, 2013."},{"key":"8_CR19","first-page":"1","volume-title":"Fully homomorphic simd operations","author":"N.P. Smart","year":"2012","unstructured":"N.P. Smart and F.\u00a0Vercauteren, Fully homomorphic simd operations, Designs, Codes and Cryptography (2012), 1\u201325."},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Ken Smith, Ameet Kini, William Wang, Chris Wolf, M.\u00a0David Allen, and Andrew Sillers, Intuitive interaction with encrypted query execution in datastorm, 2012 IEEE 28th International Conference on Data Engineering (ICDE), April 2012, pp.\u00a01333 \u20131336.","DOI":"10.1109\/ICDE.2012.140"},{"issue":"8","key":"8_CR21","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/S1353-4858(11)70086-1","volume":"2011","author":"Colin Tankard","year":"2011","unstructured":"Colin Tankard, Advanced persistent threats and how to monitor and deter them, Network Security 2011 (2011), no.\u00a08, 16 \u2013 19.","journal-title":"Network Security"},{"key":"8_CR22","first-page":"305","volume":"2012","author":"Yinqian Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart, Cross-vm side channels and their use to extract private keys, Proceedings of the","year":"2012","unstructured":"Yinqian Zhang, Ari Juels, Michael\u00a0K. Reiter, and Thomas Ristenpart, Cross-vm side channels and their use to extract private keys, Proceedings of the 2012 ACM conference on Computer and communications security (New York, NY, USA), ACM, 2012, pp.\u00a0305\u2013316.","journal-title":"ACM"}],"container-title":["Secure Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4614-9278-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T16:50:52Z","timestamp":1746118252000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-1-4614-9278-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,7]]},"ISBN":["9781461492771","9781461492788"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-1-4614-9278-8_8","relation":{},"subject":[],"published":{"date-parts":[[2013,12,7]]},"assertion":[{"value":"7 December 2013","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}