{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T06:31:44Z","timestamp":1764570704159,"version":"3.37.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319598697"},{"type":"electronic","value":"9783319598703"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59870-3_11","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T02:14:17Z","timestamp":1496110457000},"page":"193-213","source":"Crossref","is-referenced-by-count":21,"title":["Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions"],"prefix":"10.1007","author":[{"given":"Keita","family":"Emura","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"issue":"4","key":"11_CR1","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1007\/s00145-015-9211-7","volume":"29","author":"M Abe","year":"2016","unstructured":"Abe, M., Chase, M., David, B., Kohlweiss, M., Nishimaki, R., Ohkubo, M.: Constant-size structure-preserving signatures: Generic constructions and simple assumptions. J. Cryptology 29(4), 833\u2013878 (2016)","journal-title":"J. Cryptology"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Backes, M., Fiore, D., Reischuk, R.M.: Verifiable delegation of computation on outsourced data. In: ACM CCS, pp. 863\u2013874 (2013)","DOI":"10.1145\/2508859.2516681"},{"key":"11_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/978-3-662-53890-6_19","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2016","author":"S Badrinarayanan","year":"2016","unstructured":"Badrinarayanan, S., Goyal, V., Jain, A., Sahai, A.: Verifiable functional encryption. In: Cheon, J.H., Takagi, T. (eds.) ASIACRYPT 2016. LNCS, vol. 10032, pp. 557\u2013587. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-53890-6_19"},{"key":"11_CR4","unstructured":"Barker, E.: NIST Special Publication 800\u201357 Part 1, Revision 4. http:\/\/dx.doi.org\/10.6028\/NIST.Spp.800--57pt1r4"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Barreto, P., Naehrig, M.: Pairing-friendly elliptic curves of prime order. In: Selected Areas in Cryptography, pp. 319\u2013331 (2005)","DOI":"10.1007\/11693383_22"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Barthe, G., Danezis, G., Gr\u00e9goire, B., Kunz, C., B\u00e9guelin, S.Z.: Verified computational differential privacy with applications to smart metering. In: IEEE Computer Security Foundations Symposium, pp. 287\u2013301 (2013)","DOI":"10.1109\/CSF.2013.26"},{"key":"11_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-68339-9_34","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399\u2013416. Springer, Heidelberg (1996). doi: 10.1007\/3-540-68339-9_34"},{"issue":"3","key":"11_CR8","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/2873069","volume":"18","author":"F Benhamouda","year":"2016","unstructured":"Benhamouda, F., Joye, M., Libert, B.: A new framework for privacy-preserving aggregation of time-series data. ACM Trans. Inf. Syst. Secur. 18(3), 10 (2016)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"11_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-540-24676-3_14","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random Oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223\u2013238. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-24676-3_14"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-540-85538-5_3","volume-title":"Pairing-Based Cryptography \u2013 Pairing 2008","author":"X Boyen","year":"2008","unstructured":"Boyen, X.: The Uber-assumption family. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 39\u201356. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-85538-5_3"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Chan, T.H., Shi, E., Song, D.: Privacy-preserving stream aggregation with fault tolerance. In: Financial Cryptography, pp. 200\u2013214 (2012)","DOI":"10.1007\/978-3-642-32946-3_15"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-69053-0_9","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1997","author":"R Cramer","year":"1997","unstructured":"Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 103\u2013118. Springer, Heidelberg (1997). doi: 10.1007\/3-540-69053-0_9"},{"key":"11_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/3-540-46035-7_4","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"R Cramer","year":"2002","unstructured":"Cramer, R., Shoup, V.: Universal hash proofs and a paradigm for adaptive chosen ciphertext secure public-key encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 45\u201364. Springer, Heidelberg (2002). doi: 10.1007\/3-540-46035-7_4"},{"issue":"1","key":"11_CR14","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1587\/transfun.E92.A.53","volume":"92\u2013A","author":"Y Cui","year":"2009","unstructured":"Cui, Y., Fujisaki, E., Hanaoka, G., Imai, H., Zhang, R.: Formal security treatments for IBE-to-signature transformation: relations among security notions. IEICE Trans. 92\u2013A(1), 53\u201366 (2009)","journal-title":"IEICE Trans."},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Danezis, G., Fournet, C., Kohlweiss, M., B\u00e9guelin, S.Z.: Smart meter aggregation via secret-sharing. In: ACM Workshop on Smart Energy Grid Security, pp. 75\u201380 (2013)","DOI":"10.1145\/2516930.2516944"},{"issue":"1","key":"11_CR16","doi-asserted-by":"crossref","first-page":"666","DOI":"10.1109\/TII.2013.2277938","volume":"10","author":"C Fan","year":"2014","unstructured":"Fan, C., Huang, S., Lai, Y.: Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Industr. Inf. 10(1), 666\u2013675 (2014)","journal-title":"IEEE Trans. Industr. Inf."},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Fiore, D., Gennaro, R., Pastro, V.: Efficiently verifiable computation on encrypted data. In: ACM CCS, pp. 844\u2013855 (2014)","DOI":"10.1145\/2660267.2660366"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Garcia, F.D., Jacobs, B.: Privacy-friendly energy-metering via homomorphic encryption. In: Security and Trust Management, pp. 226\u2013238 (2010)","DOI":"10.1007\/978-3-642-22444-7_15"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: STOC, pp. 169\u2013178 (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"11_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-55220-5_32","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2014","author":"S Goldwasser","year":"2014","unstructured":"Goldwasser, S., et al.: Multi-input functional encryption. In: Nguyen, P.Q., Oswald, E. (eds.) EUROCRYPT 2014. LNCS, vol. 8441, pp. 578\u2013602. Springer, Heidelberg (2014). doi: 10.1007\/978-3-642-55220-5_32"},{"key":"11_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-19571-6_21","volume-title":"Theory of Cryptography","author":"M Green","year":"2011","unstructured":"Green, M., Hohenberger, S.: Practical adaptive oblivious transfer from simple assumptions. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 347\u2013363. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19571-6_21"},{"key":"11_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/3-540-45539-6_38","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"M Hirt","year":"2000","unstructured":"Hirt, M., Sako, K.: Efficient receipt-free voting based on homomorphic encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539\u2013556. Springer, Heidelberg (2000). doi: 10.1007\/3-540-45539-6_38"},{"key":"11_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/978-3-662-49096-9_14","volume-title":"Theory of Cryptography","author":"D Hofheinz","year":"2016","unstructured":"Hofheinz, D., Jager, T.: Verifiable random functions from standard assumptions. In: Kushilevitz, E., Malkin, T. (eds.) TCC 2016. LNCS, vol. 9562, pp. 336\u2013362. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49096-9_14"},{"key":"11_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-662-46497-7_5","volume-title":"Theory of Cryptography","author":"T Jager","year":"2015","unstructured":"Jager, T.: Verifiable random functions from weaker assumptions. In: Dodis, Y., Nielsen, J.B. (eds.) TCC 2015. LNCS, vol. 9015, pp. 121\u2013143. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-46497-7_5"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Johns, M., Kerschbaum, F.: Plug-in privacy for smart metering billing. In: Privacy Enhancing Technologies, pp. 192\u2013210 (2011)","DOI":"10.1007\/978-3-642-22263-4_11"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Jawurek, M., Kerschbaum, F.: Fault-tolerant privacy-preserving statistics. In: Privacy Enhancing Technologies, pp. 221\u2013238 (2012)","DOI":"10.1007\/978-3-642-31680-7_12"},{"key":"11_CR27","doi-asserted-by":"crossref","unstructured":"Joye, M., Libert, B.: A scalable scheme for privacy-preserving aggregation of time-series data. In: Financial Cryptography, pp. 111\u2013125 (2013)","DOI":"10.1007\/978-3-642-39884-1_10"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Kiltz, E., Vahlis, Y.: CCA2 secure IBE: standard model efficiency through authenticated symmetric encryption. In: CT-RSA, pp. 221\u2013238 (2008)","DOI":"10.1007\/978-3-540-79263-5_14"},{"key":"11_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-662-53018-4_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2016","author":"T Kim","year":"2016","unstructured":"Kim, T., Barbulescu, R.: Extended tower number field sieve: a new complexity for the medium prime case. In: Robshaw, M., Katz, J. (eds.) CRYPTO 2016. LNCS, vol. 9814, pp. 543\u2013571. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-53018-4_20"},{"key":"11_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-319-12280-9_20","volume-title":"Cryptology and Network Security","author":"I Leontiadis","year":"2014","unstructured":"Leontiadis, I., Elkhiyaoui, K., Molva, R.: Private and dynamic time-series data aggregation with trust relaxation. In: Gritzalis, D., Kiayias, A., Askoxylakis, I. (eds.) CANS 2014. LNCS, vol. 8813, pp. 305\u2013320. Springer, Cham (2014). doi: 10.1007\/978-3-319-12280-9_20"},{"key":"11_CR31","doi-asserted-by":"crossref","unstructured":"Leontiadis, I., Elkhiyaoui, K., \u00d6nen, M., Molva, R.: PUDA - privacy and unforgeability for data aggregation. In: CANS, pp. 3\u201318 (2015)","DOI":"10.1007\/978-3-319-26823-1_1"},{"key":"11_CR32","doi-asserted-by":"crossref","unstructured":"Li, Q., Cao, G.: Efficient privacy-preserving stream aggregation in mobile sensing with low aggregation error. In: Privacy Enhancing Technologies, pp. 60\u201381 (2013)","DOI":"10.1007\/978-3-642-39077-7_4"},{"key":"11_CR33","doi-asserted-by":"crossref","unstructured":"Libert, B., Mouhartem, F., Peters, T., Yung, M.: Practical \u201csignatures with efficient protocols\u201d from simple assumptions. In: AsiaCCS, pp. 511\u2013522 (2016)","DOI":"10.1145\/2897845.2897898"},{"key":"11_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-662-48000-7_15","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"B Libert","year":"2015","unstructured":"Libert, B., Peters, T., Yung, M.: Short group signatures via structure-preserving signatures: standard model security from simple assumptions. In: Gennaro, R., Robshaw, M. (eds.) CRYPTO 2015. LNCS, vol. 9216, pp. 296\u2013316. Springer, Heidelberg (2015). doi: 10.1007\/978-3-662-48000-7_15"},{"issue":"9","key":"11_CR35","doi-asserted-by":"crossref","first-page":"1621","DOI":"10.1109\/TPDS.2012.86","volume":"23","author":"R Lu","year":"2012","unstructured":"Lu, R., Liang, X., Li, X., Lin, X., Shen, X.: EPPA: an efficient and privacy-preserving aggregation scheme for secure smart grid communications. IEEE Trans. Parallel Distrib. Syst. 23(9), 1621\u20131631 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"11_CR36","doi-asserted-by":"crossref","unstructured":"Menezes, A., Sarkar, P., Singh, S.: Challenges with assessing the impact of NFS advances on the security of pairing-based cryptography. IACR Cryptology ePrint Archive 2016:1102 (2016)","DOI":"10.1007\/978-3-319-61273-7_5"},{"issue":"1","key":"11_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00145-001-0005-8","volume":"15","author":"S Micali","year":"2002","unstructured":"Micali, S., Reyzin, L.: Improving the exact security of digital signature schemes. J. Cryptology 15(1), 1\u201318 (2002)","journal-title":"J. Cryptology"},{"key":"11_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/978-3-540-45146-4_6","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"M Naor","year":"2003","unstructured":"Naor, M.: On cryptographic assumptions and challenges. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 96\u2013109. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45146-4_6"},{"key":"11_CR39","doi-asserted-by":"crossref","unstructured":"Ohara, K., Sakai, Y., Yoshida, F., Iwamoto, M., Ohta, K.: Privacy-preserving smart metering with verifiability for both billing and energy management. In: ASIAPKC, pp. 23\u201332 (2014)","DOI":"10.1145\/2600694.2600700"},{"key":"11_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-642-14623-7_11","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"T Okamoto","year":"2010","unstructured":"Okamoto, T., Takashima, K.: Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 191\u2013208. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14623-7_11"},{"key":"11_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). doi: 10.1007\/3-540-48910-X_16"},{"key":"11_CR42","doi-asserted-by":"crossref","unstructured":"Rastogi, V., Nath, S.: Differentially private aggregation of distributed time-series with transformation and encryption. In: ACM SIGMOD, pp. 735\u2013746 (2010)","DOI":"10.1145\/1807167.1807247"},{"key":"11_CR43","doi-asserted-by":"crossref","unstructured":"Rial, A., Danezis, G.: Privacy-preserving smart metering. In: WPES, pp. 49\u201360 (2011)","DOI":"10.1145\/2046556.2046564"},{"key":"11_CR44","unstructured":"Shi, E., Chan, T.H., Rieffel, E.G., Chow, R., Song, D.: Privacy-preserving aggregation of time-series data. In: NDSS (2011)"},{"key":"11_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-319-10879-7_17","volume-title":"Security and Cryptography for Networks","author":"K Takashima","year":"2014","unstructured":"Takashima, K.: Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption. In: Abdalla, M., Prisco, R. (eds.) SCN 2014. LNCS, vol. 8642, pp. 298\u2013317. Springer, Cham (2014). doi: 10.1007\/978-3-319-10879-7_17"},{"key":"11_CR46","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/978-3-642-03356-8_36","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"B Waters","year":"2009","unstructured":"Waters, B.: Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 619\u2013636. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03356-8_36"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59870-3_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T23:09:13Z","timestamp":1659049753000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59870-3_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319598697","9783319598703"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59870-3_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}