{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T05:49:54Z","timestamp":1743054594933,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319470719"},{"type":"electronic","value":"9783319470726"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_8","type":"book-chapter","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T21:20:20Z","timestamp":1474406420000},"page":"113-129","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Searchable Encryption for Biometric Identification Revisited"],"prefix":"10.1007","author":[{"given":"Ghassane","family":"Amchyaa","sequence":"first","affiliation":[]},{"given":"Julien","family":"Bringer","sequence":"additional","affiliation":[]},{"given":"Roch","family":"Lescuyer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-10772-6_8","volume-title":"Information Systems Security","author":"M Adjedj","year":"2009","unstructured":"Adjedj, M., Bringer, J., Chabanne, H., Kindarji, B.: Biometric identification over encrypted data made feasible. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 86\u2013100. Springer, Heidelberg (2009)"},{"key":"8_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/978-3-662-46706-0_31","volume-title":"Fast Software Encryption","author":"A Boldyreva","year":"2015","unstructured":"Boldyreva, A., Chenette, N.: Efficient fuzzy search on encrypted data. In: Cid, C., Rechberger, C. (eds.) FSE 2014. LNCS, vol. 8540, pp. 613\u2013633. Springer, Heidelberg (2015)"},{"issue":"5","key":"8_CR3","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1002\/sec.206","volume":"4","author":"J Bringer","year":"2011","unstructured":"Bringer, J., Chabanne, H., Kindarji, B.: Identification with encrypted biometric data. Secur. Commun. Netw. 4(5), 548\u2013562 (2011)","journal-title":"Secur. Commun. Netw."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Bringer, J., Chabanne, H., Patey, A.: Practical identification with encrypted biometric data using Oblivious RAM. In: ICB 2013, pp. 1\u20138. IEEE (2013)","DOI":"10.1109\/ICB.2013.6612970"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C.S., Krawczyk, H., Rosu, M., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: NDSS 2014. The Internet Society (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/978-3-642-40041-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"D Cash","year":"2013","unstructured":"Cash, D., Jarecki, S., Jutla, C., Krawczyk, H., Ro\u015fu, M.-C., Steiner, M.: Highly-scalable searchable symmetric encryption with support for boolean queries. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 353\u2013373. Springer, Heidelberg (2013)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: CCS 2006, pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"issue":"1","key":"8_CR8","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"8_CR9","unstructured":"Apache Hadoop Project. \n                      http:\/\/hadoop.apache.org\/"},{"key":"8_CR10","unstructured":"Huang, Y., Malka, L., Evans, D., Katz, J.: Efficient privacy-preserving biometric identification. In: NDSS 2011. The Internet Society (2011)"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circ. Syst. Video Technol. 14(1), 4\u201320 (2004)","journal-title":"IEEE Trans. Circ. Syst. Video Technol."},{"issue":"99","key":"8_CR12","first-page":"1","volume":"PP","author":"J Li","year":"2016","unstructured":"Li, J., Lin, X., Zhang, Y., Han, J.: KSF-OABE: outsourced attribute-based encryption with keyword search function for cloud storage. IEEE Trans. Serv. Comput. PP(99), 1 (2016)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"2","key":"8_CR13","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MSP.2012.2230219","volume":"30","author":"CA Melchor","year":"2013","unstructured":"Melchor, C.A., Fau, S., Fontaine, C., Gogniat, G., Sirdey, R.: Recent advances in homomorphic encryption: a possible future for signal processing in the encrypted domain. IEEE Sig. Process. Mag. 30(2), 108\u2013117 (2013)","journal-title":"IEEE Sig. Process. Mag."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R.: Efficient computation on oblivious rams. In: ACM Symposium on Theory of Computing - STOC 1990, pp. 514\u2013523. ACM (1990)","DOI":"10.1145\/100216.100289"},{"key":"8_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/978-3-540-71677-8_26","volume-title":"Public Key Cryptography \u2013 PKC 2007","author":"R Ostrovsky","year":"2007","unstructured":"Ostrovsky, R., Skeith, W.E.: A survey of single-database private information retrieval: techniques and applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393\u2013411. Springer, Heidelberg (2007). doi:\n                      10.1007\/978-3-540-71677-8_26"},{"key":"8_CR16","unstructured":"Wang, J., Shen, H.T., Song, J., Ji, J.: Hashing for similarity search: a survey. In: CoRR, abs\/1408.2927 (2014)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T01:30:28Z","timestamp":1558315828000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}