{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:22Z","timestamp":1763468182079},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_4","type":"book-chapter","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T20:43:14Z","timestamp":1400100194000},"page":"56-69","source":"Crossref","is-referenced-by-count":4,"title":["Privacy by Encrypted Databases"],"prefix":"10.1007","author":[{"given":"Patrick","family":"Grofig","sequence":"first","affiliation":[]},{"given":"Isabelle","family":"Hang","sequence":"additional","affiliation":[]},{"given":"Martin","family":"H\u00e4rterich","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Kerschbaum","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Kohler","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Schaad","sequence":"additional","affiliation":[]},{"given":"Axel","family":"Schr\u00f6pfer","sequence":"additional","affiliation":[]},{"given":"Walter","family":"Tighzert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, D., Abbadi, A.E., Emek\u00e7i, F., Metwally, A.: Database management as a service: challenges and opportunities. In: Proceedings of the 25th International Conference on Data Engineering, ICDE (2009)","DOI":"10.1109\/ICDE.2009.151"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM International Conference on Management of Data, SIGMOD (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-74143-5_30","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 535\u2013552. Springer, Heidelberg (2007)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A. Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 224\u2013241. Springer, Heidelberg (2009)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-22792-9_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"A. Boldyreva","year":"2011","unstructured":"Boldyreva, A., Chenette, N., O\u2019Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol.\u00a06841, pp. 578\u2013595. Springer, Heidelberg (2011)"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Catrina, O., Kerschbaum, F.: Fostering the uptake of secure multiparty computation in e-commerce. In: Proceedings of the 3rd International Conference on Availability, Reliability and Security, ARES (2008)","DOI":"10.1109\/ARES.2008.49"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Chaves, L.W.F., Kerschbaum, F.: Industrial privacy in rfid-based batch recalls. In: Proceedings of the International Workshop on Security and Privacy in Enterprise Computing, INSPEC (2008)","DOI":"10.1109\/EDOCW.2008.37"},{"key":"4_CR8","unstructured":"Curino, C., Jones, E.P.C., Popa, R.A., Malviya, N., Wu, E., Madden, S., Balakrishnan, H., Zeldovich, N.: Relational cloud: A database-as-a-service for the cloud. In: Proceedings of the 5th Conference on Innovative Data Systems Research, CIDR (2011)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Re. Curtmola, J., Garay, S., Kamara, R.: Ostrovsky.: Searchable symmetric encryption: improved definitions and efficient constructions. Journal of Computer Security\u00a019(5) (2011)","DOI":"10.3233\/JCS-2011-0426"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Dreier, J., Kerschbaum, F.: Practical privacy-preserving multiparty linear programming based on problem transformation. In: Proceedings of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust, PASSA (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.19"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B., Mehrotra, S.: Efficient execution of aggregation queries over encrypted relational databases. In: Lee, Y., Li, J., Whang, K.-Y., Lee, D. (eds.) DASFAA 2004. LNCS, vol.\u00a02973, pp. 125\u2013136. Springer, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24571-1_10"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Hacig\u00fcm\u00fcs, H., Iyer, B.R., Li, C., Mehrotra, S.: Executing sql over encrypted data in the database-service-provider model. In: Proceedings of the 2002 ACM International Conference on Management of Data, SIGMOD (2002)","DOI":"10.1145\/564691.564717"},{"key":"4_CR13","unstructured":"Hacig\u00fcm\u00fcs, H., Mehrotra, S., Iyer, B.R.: Providing database as a service. In: Proceedings of the 18th International Conference on Data Engineering, ICDE (2002)"},{"key":"4_CR14","unstructured":"Islam, M., Kuzu, M., Kantarcioglu, M.: Access pattern disclosure on searchable encryption: ramification, attack and mitigation. In: Proceedings of the 19th Network and Distributed System Security Symposium, NDSS (2012)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Simple cross-site attack prevention. In: Proceedings of the 3rd International Conference on Security and Privacy in Communications Networks, SECURECOMM (2007)","DOI":"10.1109\/SECCOM.2007.4550368"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Building a privacy-preserving benchmarking enterprise system. Enterprise Information Systems\u00a02(4) (2008)","DOI":"10.1080\/17517570802372468"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: An access control model for mobile physical objects. In: Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, SACMAT (2010)","DOI":"10.1145\/1809842.1809873"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Automatically optimizing secure computation. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS (2011)","DOI":"10.1145\/2046707.2046786"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F., Biswas, D., de Hoogh, S.: Performance comparison of secure comparison protocols. In: Proceedings of the International Workshop on Business Processes Security, WSBPS (2009)","DOI":"10.1109\/DEXA.2009.37"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-39256-6_13","volume-title":"Data and Applications Security and Privacy XXVII","author":"F. Kerschbaum","year":"2013","unstructured":"Kerschbaum, F., H\u00e4rterich, M., Grofig, P., Kohler, M., Schaad, A., Schr\u00f6pfer, A., Tighzert, W.: Optimal re-encryption strategy for joins in encrypted databases. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol.\u00a07964, pp. 195\u2013210. Springer, Heidelberg (2013)"},{"key":"4_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1007\/978-3-642-45204-8_2","volume-title":"Information Systems Security","author":"F. Kerschbaum","year":"2013","unstructured":"Kerschbaum, F., H\u00e4rterich, M., Kohler, M., Hang, I., Schaad, A., Schr\u00f6pfer, A., Tighzert, W.: An encrypted in-memory column-store: the onion selection problem. In: Bagchi, A., Ray, I. (eds.) ICISS 2013. LNCS, vol.\u00a08303, pp. 14\u201326. Springer, Heidelberg (2013)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1007\/978-3-642-16822-2_12","volume-title":"Radio Frequency Identification: Security and Privacy Issues","author":"F. Kerschbaum","year":"2010","unstructured":"Kerschbaum, F., Oertel, N.: Privacy-preserving pattern matching for anomaly detection in rfid anti-counterfeiting. In: Ors Yalcin, S.B. (ed.) RFIDSec 2010. LNCS, vol.\u00a06370, pp. 124\u2013137. Springer, Heidelberg (2010)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F., Sorniotti, A.: Rfid-based supply chain partner authentication and key agreement. In: Proceedings of the 2nd ACM Conference on Wireless Network Security, WISEC (2009)","DOI":"10.1145\/1514274.1514281"},{"key":"4_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/11766155_29","volume-title":"Emerging Trends in Information and Communication Security","author":"F. Kerschbaum","year":"2006","unstructured":"Kerschbaum, F., Terzidis, O.: Filtering for private collaborative benchmarking. In: M\u00fcller, G. (ed.) ETRICS 2006. LNCS, vol.\u00a03995, pp. 409\u2013422. Springer, Heidelberg (2006)"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"P. Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 223\u2013228. Springer, Heidelberg (1999)"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Pibernik, R., Zhang, Y., Kerschbaum, F., Schr\u00f6pfer, A.: Secure collaborative supply chain planning and inverse optimization\u2013the jels model. European Journal of Operational Research\u00a0208(1) (2011)","DOI":"10.1016\/j.ejor.2010.08.018"},{"issue":"1","key":"4_CR27","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/TIT.1978.1055817","volume":"24","author":"S.C. Pohlig","year":"1978","unstructured":"Pohlig, S.C., Hellman, M.E.: An improved algorithm for computing logarithms over gf(p) and its cryptographic significance. IEEE Transactions on Information Theory\u00a024(1), 106\u2013110 (1978)","journal-title":"IEEE Transactions on Information Theory"},{"key":"4_CR28","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Li, F.H., Zeldovich, N.: An ideal-security protocol for order-preserving encoding. In: Proceedings of the 34th IEEE Symposium on Security and Privacy (2013)","DOI":"10.1109\/SP.2013.38"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redfield, C.M.S., Zeldovich, N., Balakrishnan, H.: Cryptdb: protecting confidentiality with encrypted query processing. In: Proceedings of the 23rd ACM Symposium on Operating Systems Principles, SOSP (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Schr\u00f6pfer, A., Kerschbaum, F., M\u00fcller, G.: L1 \u2013 an intermediate language for mixed-protocol secure computation. In: Proceedings of the 35th IEEE Computer Software and Applications Conference, COMPSAC (2011)","DOI":"10.1109\/COMPSAC.2011.46"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Tu, S., Kaashoek, M.F., Madden, S., Zeldovich, N.: Processing analytical queries over encrypted data. In: Proceedings of the 39th International Conference on Very Large Data Bases, PVLDB (2013)","DOI":"10.14778\/2535573.2488336"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T16:53:34Z","timestamp":1558889614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}