{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:15:27Z","timestamp":1752671727747,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319208091"},{"type":"electronic","value":"9783319208107"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20810-7_7","type":"book-chapter","created":{"date-parts":[[2015,6,21]],"date-time":"2015-06-21T23:47:00Z","timestamp":1434930420000},"page":"103-118","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy Preserving Record Matching Using Automated Semi-trusted Broker"],"prefix":"10.1007","author":[{"given":"Ibrahim","family":"Lazrig","sequence":"first","affiliation":[]},{"given":"Tarik","family":"Moataz","sequence":"additional","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Indrakshi","family":"Ray","sequence":"additional","affiliation":[]},{"given":"Toan","family":"Ong","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Kahn","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Nora","family":"Cuppens","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,6,23]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577\u2013594. Springer, Heidelberg (2010)"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA. pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, Hangzhou, China. pp. 265\u2013276 (2013)","DOI":"10.1145\/2484313.2484347"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C.W., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of ACM Conference on Computer and Communications Security, Berlin, Germany. 299\u2013310 (2013)","DOI":"10.1145\/2508859.2516660"},{"key":"7_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1007\/978-3-642-55415-5_5","volume-title":"ICT Systems Security and Privacy Protection","author":"M Strizhov","year":"2014","unstructured":"Strizhov, M., Ray, I.: Multi-keyword similarity search over encrypted cloud data. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IFIP AICT, vol. 428, pp. 52\u201365. Springer, Heidelberg (2014)"},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1504\/IJACT.2012.048080","volume":"2","author":"D Dachman-Soled","year":"2012","unstructured":"Dachman-Soled, D., Malkin, T., Raykova, M., Yung, M.: Efficient robust private set intersection. Int. J. Appl. Crypt. 2, 289\u2013303 (2012)","journal-title":"Int. J. Appl. Crypt."},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-642-54268-8","volume-title":"Financial Cryptography and Data Security","author":"S Kamara","year":"2014","unstructured":"Kamara, S., Mohassel, P., Raykova, M., Sadeghian, S.: Scaling private set intersection to billion-element sets. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 193\u2013213. Springer, Heidelberg (2014)"},{"key":"7_CR9","unstructured":"Goldreich, O.: Secure multi-party computation. Manuscript. Preliminary version (1998). \n                      http:\/\/citeseerx.ist.psu.edu\n                      \n                    . Accessed on 30 April 2015"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Evfimievski, A., Srikant, R.: Information sharing across private databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, San Diego, CA, USA. pp. 86\u201397 (2003)","DOI":"10.1145\/872757.872771"},{"key":"7_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-642-21599-5_18","volume-title":"Trust and Trustworthy Computing","author":"E Cristofaro De","year":"2011","unstructured":"De Cristofaro, E., Lu, Y., Tsudik, G.: Efficient techniques for privacy-preserving sharing of sensitive information. In: McCune, J.M., Balacheff, B., Perrig, A., Sadeghi, A.-R., Sasse, A., Beres, Y. (eds.) Trust 2011. LNCS, vol. 6740, pp. 239\u2013253. Springer, Heidelberg (2011)"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"784","DOI":"10.1197\/jamia.M2985","volume":"16","author":"AD Boyd","year":"2009","unstructured":"Boyd, A.D., Saxman, P.R., Hunscher, D.A., Smith, K.A., Morris, T.D., Kaston, M., Bayoff, F., Rogers, B., Hayes, P., Rajeev, N., Kline-Rogers, E., Eagle, K., Clauw, D., Greden, J.F., Green, L.A., Athey, B.D.: The University of Michigan honest broker: a web-based service for clinical and translational research and practice. J. Am. Med. Inform. Assoc. : JAMIA 16, 784\u2013791 (2009)","journal-title":"J. Am. Med. Inform. Assoc. : JAMIA"},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"1705","DOI":"10.1002\/cncr.23768","volume":"113","author":"R Dhir","year":"2008","unstructured":"Dhir, R., Patel, A.A., Winters, S., Bisceglia, M., Swanson, D., Aamodt, R., Becich, M.J.: A multidisciplinary approach to honest broker services for tissue banks and clinical data. Cancer 113, 1705\u20131715 (2008)","journal-title":"Cancer"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Jefferies, N., Mitchell, C.J., Walker, M.: A proposed architecture for trusted third party services. In: Proceedings of the International Conference on Cryptography: Policy and Algorithms, Brisbane, Queensland, Australia. pp. 98\u2013104 (1995)","DOI":"10.1007\/BFb0032349"},{"key":"7_CR15","unstructured":"Ajmani, S., Morris, R., Liskov, B.: A trusted third-party computation service (2001). \n                      http:\/\/www.pmg.lcs.mit.edu\/~ajmani\/papers\/tep.ps\n                      \n                    . Accessed on 30 April 2015"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1109\/TSC.2008.14","volume":"1","author":"S Yau","year":"2008","unstructured":"Yau, S., Yin, Y.: A privacy preserving repository for data integration across data sharing services. IEEE Trans. Serv. Comput. 1, 130\u2013140 (2008)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"7_CR17","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1109\/TKDE.2011.142","volume":"24","author":"B Carbunar","year":"2012","unstructured":"Carbunar, B., Sion, R.: Toward private joins on outsourced data. IEEE Trans. Knowl. Data Eng. 24, 1699\u20131710 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR18","unstructured":"Chow, S.S., Lee, J.H., Subramanian, L.: Two-party computation model for privacy-preserving queries over distributed databases. In: Proceedings of the 2009 Network and Distributed System Security Symposium, San Diego, CA, USA (2009)"},{"key":"7_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2188349.2188353","volume":"37","author":"T Tassa","year":"2012","unstructured":"Tassa, T., Gudes, E.: Secure distributed computation of anonymized views of shared databases. ACM Trans. Database Syst. (TODS) 37, 11 (2012)","journal-title":"ACM Trans. Database Syst. (TODS)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"7_CR21","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48, 203\u2013209 (1987)","journal-title":"Math. Comput."}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIX"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20810-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,21]],"date-time":"2019-06-21T20:14:40Z","timestamp":1561148080000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20810-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319208091","9783319208107"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20810-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"23 June 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}