{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T04:10:05Z","timestamp":1751861405167,"version":"3.41.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000110"},{"type":"electronic","value":"9783030000127"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00012-7_7","type":"book-chapter","created":{"date-parts":[[2018,9,12]],"date-time":"2018-09-12T18:15:30Z","timestamp":1536776130000},"page":"69-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Identity Based Privacy Information Sharing with Similarity Test in Cloud Environment"],"prefix":"10.1007","author":[{"given":"Faguo","family":"Wu","sequence":"first","affiliation":[]},{"given":"Wang","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhiming","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Wenhua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,13]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Ahle, T.D., Aumller, M., Pagh, R.: Parameter-free locality sensitive hashing for spherical range reporting, pp. 239\u2013256 (2016)","key":"7_CR1","DOI":"10.1137\/1.9781611974782.16"},{"unstructured":"Andoni, A., Razenshteyn, I.: Tight lower bounds for data-dependent locality-sensitive hashing. Computer Science (2016)","key":"7_CR2"},{"issue":"8","key":"7_CR3","doi-asserted-by":"publisher","first-page":"2374","DOI":"10.1109\/TC.2015.2389959","volume":"65","author":"B Cui","year":"2016","unstructured":"Cui, B., Liu, Z., Wang, L.: Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage. IEEE Trans. Comput. 65(8), 2374\u20132385 (2016)","journal-title":"IEEE Trans. Comput."},{"doi-asserted-by":"crossref","unstructured":"Hahn, F., Kerschbaum, F.: Searchable encryption with secure and efficient updates, pp. 310\u2013320 (2017)","key":"7_CR4","DOI":"10.1145\/2660267.2660297"},{"doi-asserted-by":"crossref","unstructured":"Indyk, P.: Approximate nearest neighbors: towards removing the curse of dimensionality. Department of Computer Science, Stanford University (1998)","key":"7_CR5","DOI":"10.1145\/276698.276876"},{"unstructured":"Khader, D.: Introduction to attribute based searchable encryption (2016)","key":"7_CR6"},{"doi-asserted-by":"crossref","unstructured":"Lizunov, P., Biloshchytskyi, A., Kuchansky, A., Biloshchytska, S., Chala, L.: Detection of near duplicates in tables based on the locality-sensitive hashing method and the nearest neighbor method. 6(4(84)), 4\u201310 (2016)","key":"7_CR7","DOI":"10.15587\/1729-4061.2016.86243"},{"unstructured":"Luo, Y., Zeng, J., Berger, B., Peng, J.: Low-density locality-sensitive hashing boosts metagenomic binning, p. 255 (2016)","key":"7_CR8"},{"issue":"C","key":"7_CR9","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.ins.2015.08.053","volume":"328","author":"S Ma","year":"2016","unstructured":"Ma, S.: Identity-based encryption with outsourced equality test in cloud computing. Inf. Sci. Int. J. 328(C), 389\u2013402 (2016)","journal-title":"Inf. Sci. Int. J."},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1109\/TIFS.2014.2378592","volume":"10","author":"S Ma","year":"2015","unstructured":"Ma, S., Huang, Q., Zhang, M., Yang, B.: Efficient public key encryption with equality test supporting flexible authorization. IEEE Trans. Inf. Forensics Secur. 10(3), 458\u2013470 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1002\/cpe.3608","volume":"28","author":"Y Miao","year":"2016","unstructured":"Miao, Y., Ma, J., Liu, Z.: Revocable and anonymous searchable encryption in multi-user setting. Concurr. Comput. Pract. Exp. 28(4), 1204\u20131218 (2016)","journal-title":"Concurr. Comput. Pract. Exp."},{"unstructured":"Ming-Fu, L.I., Chen, L.W.: A secure cloud data sharing scheme from identity-based proxy re-encryption. Nat. Sci. J. Xiangtan Univ. (2017)","key":"7_CR12"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-642-22497-3_25","volume-title":"Information Security and Privacy","author":"Q Tang","year":"2011","unstructured":"Tang, Q.: Towards public key encryption scheme supporting equality test with fine-grained authorization. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 389\u2013406. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-22497-3_25"},{"issue":"99","key":"7_CR14","first-page":"1","volume":"PP","author":"Q Wang","year":"2016","unstructured":"Wang, Q., He, M., Du, M., Chow, S.S.M., Lai, R.W.F., Zou, Q.: Searchable encryption over feature-rich data. IEEE Trans. Dependable Secure Comput. PP(99), 1 (2016)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"C","key":"7_CR15","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.future.2017.03.007","volume":"73","author":"L Wu","year":"2017","unstructured":"Wu, L., Zhang, Y., Choo, K.K.R., He, D.: Efficient and secure identity-based encryption scheme with equality test in cloud computing. Future Gener. Comput. Syst. 73(C), 22\u201331 (2017)","journal-title":"Future Gener. Comput. Syst."},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-11925-5_9","volume-title":"Topics in Cryptology - CT-RSA 2010","author":"G Yang","year":"2010","unstructured":"Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119\u2013131. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-11925-5_9"},{"issue":"C","key":"7_CR17","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/j.ins.2015.09.006","volume":"329","author":"Z Zhu","year":"2016","unstructured":"Zhu, Z., Xiao, J., He, S., Ji, Z., Sun, Y.: A multi-objective memetic algorithm based on locality-sensitive hashing for one-to-many-to-one dynamic pickup-and-delivery problem. Inf. Sci. Int. J. 329(C), 73\u201389 (2016)","journal-title":"Inf. Sci. Int. J."}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00012-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,7]],"date-time":"2025-07-07T03:43:38Z","timestamp":1751859818000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00012-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000110","9783030000127"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00012-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}