{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:28:36Z","timestamp":1758270516384,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030884277"},{"type":"electronic","value":"9783030884284"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-88428-4_2","type":"book-chapter","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T06:03:11Z","timestamp":1633068191000},"page":"24-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Geo-DRS: Geometric Dynamic Range Search on Spatial Data with Backward and Content Privacy"],"prefix":"10.1007","author":[{"given":"Shabnam Kasra","family":"Kermanshahi","sequence":"first","affiliation":[]},{"given":"Rafael","family":"Dowsley","sequence":"additional","affiliation":[]},{"given":"Ron","family":"Steinfeld","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Sakzad","sequence":"additional","affiliation":[]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Xun","family":"Yi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,2]]},"reference":[{"key":"2_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1090\/conm\/223\/03131","volume":"223","author":"PK Agarwal","year":"1999","unstructured":"Agarwal, P.K., Erickson, J., et al.: Geometric range searching and its relatives. Contemp. Math. 223, 1\u201356 (1999)","journal-title":"Contemp. Math."},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD, pp. 563\u2013574. ACM (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Beaver, D.: Commodity-based cryptography (extended abstract). In: Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, 4\u20136 May 1997, pp. 446\u2013455 (1997)","DOI":"10.1145\/258533.258637"},{"key":"2_CR4","unstructured":"Bost, R.: $$\\sigma o \\varphi o \\varsigma $$: forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1143\u20131154. ACM (2016)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465\u20131482. ACM (2017)","DOI":"10.1145\/3133956.3133980"},{"issue":"2","key":"2_CR6","first-page":"217","volume":"16","author":"MD Cock","year":"2019","unstructured":"Cock, M.D., et al.: Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE TDSC 16(2), 217\u2013230 (2019)","journal-title":"IEEE TDSC"},{"key":"2_CR7","unstructured":"Dowsley, R.: Cryptography based on correlated data: foundations and practice. Ph.D. thesis, Karlsruhe Institute of Technology, Germany (2016)"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Durak, F.B., DuBuisson, T.M., Cash, D.: What else is revealed by order-revealing encryption? In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1155\u20131166. ACM (2016)","DOI":"10.1145\/2976749.2978379"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-540-71677-8_22","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"J Garay","year":"2007","unstructured":"Garay, J., Schoenmakers, B., Villegas, J.: Practical and secure solutions for integer comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330\u2013342. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-71677-8_22"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Grubbs, P., Lacharit\u00e9, M., Minaud, B., Paterson, K.G.: Learning to reconstruct: statistical learning theory and encrypted database attacks. In: 2019 IEEE Symposium on Security and Privacy, pp. 1067\u20131083 (2019)","DOI":"10.1109\/SP.2019.00030"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Guo, R., Qin, B., Wu, Y., Liu, R., Chen, H., Li, C.: MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud. In: Proceedings of the International Symposium on Quality of Service, pp. 1\u201310 (2019)","DOI":"10.1145\/3326285.3329064"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, SIGMOD 1984, pp. 47\u201357. ACM, New York (1984)","DOI":"10.1145\/971697.602266"},{"key":"2_CR13","unstructured":"de Hoogh, S.: Design of large scale applications of secure multiparty computation: secure linear programming. Ph.D. thesis, Department of Mathematics and Computer Science (2012)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Kellaris, G., Kollios, G., Nissim, K., O\u2019neill, A.: Generic attacks on secure outsourced databases. In: Proceedings of the 2016 ACM SIGSAC, pp. 1329\u20131340. ACM (2016)","DOI":"10.1145\/2976749.2978386"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Kermanshahi, S.K., et al.: Geometric range search on encrypted data with forward\/backward security. IEEE Trans. Dependable Secure Comput. 1\u201320 (2020)","DOI":"10.1109\/TDSC.2020.2982389"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: Data recovery on encrypted databases with k-nearest neighbor query leakage. In: 2019 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 19\u201323 May 2019, pp. 1033\u20131050 (2019)","DOI":"10.1109\/SP.2019.00015"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Lacharit\u00e9, M.-S., Minaud, B., Paterson, K.G.: Improved reconstruction attacks on encrypted data using range query leakage. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 297\u2013314. IEEE (2018)","DOI":"10.1109\/SP.2018.00002"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.jpdc.2019.04.015","volume":"131","author":"X Li","year":"2019","unstructured":"Li, X., Zhu, Y., Wang, J., Zhang, J.: Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J. Parallel Distrib. Comput. 131, 44\u201354 (2019)","journal-title":"J. Parallel Distrib. Comput."},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Luo, Y., Fu, S., Wang, D., Xu, M., Jia, X.: Efficient and generalized geometric range search on encrypted spatial data in the cloud. In: 2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1\u201310. IEEE (2017)","DOI":"10.1109\/IWQoS.2017.7969108"},{"key":"2_CR20","unstructured":"Markatou, E.A., Tamassia, R.: Database reconstruction attacks in two dimensions. Cryptology ePrint Archive, Report 2020\/284 (2020). https:\/\/eprint.iacr.org\/2020\/284"},{"issue":"4","key":"2_CR21","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/197405.197408","volume":"26","author":"J Matou\u0161ek","year":"1994","unstructured":"Matou\u0161ek, J.: Geometric range searching. ACM Comput. Surv. (CSUR) 26(4), 422\u2013461 (1994)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"2_CR22","unstructured":"Morton, G.M.: A computer oriented geodetic data base and a new technique in file sequencing. Technical report, IBM (1966)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 644\u2013655. ACM (2015)","DOI":"10.1145\/2810103.2813651"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Pan, Y., et al.: Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. arXiv:2001.08773 (2020)","DOI":"10.1145\/3397166.3409135"},{"key":"2_CR25","unstructured":"Sellis, T., Roussopoulos, N., Faloutsos, C.: The R+-tree: a dynamic index for multi-dimensional objects. Technical report, University of Maryland (1987)"},{"key":"2_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-00457-5_27","volume-title":"Theory of Cryptography","author":"E Shen","year":"2009","unstructured":"Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457\u2013473. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00457-5_27"},{"issue":"4","key":"2_CR27","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TIFS.2015.2506145","volume":"11","author":"B Wang","year":"2016","unstructured":"Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704\u2013719 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR28","doi-asserted-by":"crossref","unstructured":"Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: 2015 IEEE CNS, pp. 182\u2013190. IEEE (2015)","DOI":"10.1109\/CNS.2015.7346827"},{"issue":"2","key":"2_CR29","first-page":"245","volume":"16","author":"B Wang","year":"2019","unstructured":"Wang, B., Li, M., Xiong, L.: FastGeo: efficient geometric range queries on encrypted spatial data. IEEE TDSC 16(2), 245\u2013258 (2019)","journal-title":"IEEE TDSC"},{"key":"2_CR30","doi-asserted-by":"crossref","unstructured":"Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"issue":"4","key":"2_CR31","doi-asserted-by":"publisher","first-page":"870","DOI":"10.1109\/TIFS.2018.2868162","volume":"14","author":"G Xu","year":"2019","unstructured":"Xu, G., Li, H., Dai, Y., Yang, K., Lin, X.: Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 14(4), 870\u2013885 (2019)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"2_CR32","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Shen, J., Cao, Z.: Practical and secure circular range search on private spatial data. Cryptology ePrint Archive, Report 2020\/242 (2020). https:\/\/eprint.iacr.org\/2020\/242","DOI":"10.1109\/TrustCom50675.2020.00090"},{"issue":"9","key":"2_CR33","doi-asserted-by":"publisher","first-page":"7729","DOI":"10.1109\/TVT.2015.2499791","volume":"65","author":"H Zhu","year":"2015","unstructured":"Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729\u20137739 (2015)","journal-title":"IEEE Trans. Veh. Technol."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-88428-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:41:15Z","timestamp":1725853275000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-88428-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030884277","9783030884284"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-88428-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"2 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Darmstadt","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2021.athene-center.de\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"351","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.07","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6.06","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}