{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:49Z","timestamp":1772906389824,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319914572","type":"print"},{"value":"9783319914589","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91458-9_8","type":"book-chapter","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T20:34:15Z","timestamp":1526070855000},"page":"130-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud"],"prefix":"10.1007","author":[{"given":"Wei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Yiwen","family":"Nie","sequence":"additional","affiliation":[]},{"given":"Yao","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,12]]},"reference":[{"key":"8_CR1","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of IEEE S&P, pp. 44\u201355 (2000)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Li, M., et al.: Authorized private keyword search over encrypted data in cloud computing. In: Proceedings of IEEE ICDCS, pp. 383\u2013392 (2011)","DOI":"10.1109\/ICDCS.2011.55"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Cao, N., et al.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 829\u2013837 (2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud. In: Proceedings of IEEE INFOCOM, pp. 2112\u20132120 (2014)","DOI":"10.1109\/INFOCOM.2014.6848153"},{"key":"8_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-70936-7_29"},{"key":"8_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-642-10366-7_13","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2009","author":"T Okamoto","year":"2009","unstructured":"Okamoto, T., Takashima, K.: Hierarchical predicate encryption for inner-products. In: Matsui, M. (ed.) ASIACRYPT 2009. LNCS, vol. 5912, pp. 214\u2013231. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10366-7_13"},{"key":"8_CR7","unstructured":"Lu, Y.: Privacy-preserving Logarithmic-time search on encrypted data in cloud. In: Proceedings of NDSS (2012)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Wang, P., Ravishankar, C.V.: Secure and efficient range queries on outsourced databases using $$\\widehat{R}$$-trees. In: Proceedings of IEEE ICDE, pp. 314\u2013325 (2013)","DOI":"10.1109\/ICDE.2013.6544835"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Wang, B., et al.: Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index. In: Proceedings of ACM ASIACCS, pp. 111\u2013122 (2014)","DOI":"10.1145\/2590296.2590305"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Guttman, A.: R-trees: a dynamic index structure for spatial searching. ACM (1984)","DOI":"10.1145\/602264.602266"},{"key":"8_CR11","volume-title":"Foundations of Cryptography: Basic Applications","author":"O Goldreich","year":"2009","unstructured":"Goldreich, O.: Foundations of Cryptography: Basic Applications, vol. 2. Cambridge University Press, Cambridge (2009)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Wang, C., et al.: Secure ranked keyword search over encrypted cloud data. In: Proceedings of ICDCS, pp. 253\u2013262 (2011)","DOI":"10.1109\/ICDCS.2010.34"},{"issue":"4","key":"8_CR13","doi-asserted-by":"publisher","first-page":"2305","DOI":"10.1109\/TNET.2015.2457493","volume":"24","author":"R Li","year":"2016","unstructured":"Li, R., et al.: Fast and scalable range query processing with strong privacy protection for cloud computing. IEEE\/ACM Trans. Netw. 24(4), 2305\u20132318 (2016)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Chi, J., et al.: Fast multi-dimensional range queries on encrypted cloud databases. In: Proceedings of DASFAA, pp. 559\u2013575 (2017)","DOI":"10.1007\/978-3-319-55753-3_35"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Stefanov, E., et al.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of ACM CCS, pp. 299\u2013310 (2013)","DOI":"10.1145\/2508859.2516660"},{"issue":"5","key":"8_CR16","doi-asserted-by":"publisher","first-page":"895","DOI":"10.3233\/JCS-2011-0426","volume":"19","author":"R Curtmola","year":"2011","unstructured":"Curtmola, R., et al.: Searchable symmetric encryption: improved definitions and efficient constructions. J. Comput. Secur. 19(5), 895\u2013934 (2011)","journal-title":"J. Comput. Secur."},{"key":"8_CR17","unstructured":"Lichman, M.: (1999). http:\/\/archive.ics.uci.edu\/ml"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y-C Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 442\u2013455. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11496137_30"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Wong, W.K., et al.: Secure kNN computation on encrypted databases. In: Proceedings of ACM SIGMOD, pp. 139\u2013152 (2009)","DOI":"10.1145\/1559845.1559862"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Sun, W., et al.: Catch you if you lie to me: efficient verifiable conjunctive keyword search over large dynamic encrypted cloud data. In: Proceedings of IEEE INFOCOM, pp. 2110\u20132118 (2015)","DOI":"10.1109\/INFOCOM.2015.7218596"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Papadopoulos, D., Papadopoulos, S., Triandopoulos, N.: Taking authenticated range queries to arbitrary dimensions. In: Proceedings of ACM CCS, pp. 819\u2013830 (2014)","DOI":"10.1145\/2660267.2660373"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Kawamoto, J., Yoshikawa, M.: Private range query by perturbation and matrix based encryption. In: Proceedings of ICDIM, pp. 211\u2013216 (2011)","DOI":"10.1109\/ICDIM.2011.6093317"},{"key":"8_CR23","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1007\/978-3-319-23829-6_26","volume-title":"International Conference on Security and Privacy in Communication Networks","author":"B Wang","year":"2015","unstructured":"Wang, B., Hou, Y., Li, M., Wang, H., Li, H., Li, F.: Tree-based multi-dimensional range search on encrypted data with enhanced privacy. In: Tian, J., Jing, J., Srivatsa, M. (eds.) SecureComm 2014. LNICST, vol. 152, pp. 374\u2013394. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23829-6_26"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91458-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T13:08:57Z","timestamp":1751634537000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91458-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914572","9783319914589"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91458-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DASFAA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Database Systems for Advanced Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gold Coast, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 May 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dasfaa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ict.griffith.edu.au\/conferences\/dasfaa2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}