{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T16:32:59Z","timestamp":1725985979147},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319979151"},{"type":"electronic","value":"9783319979168"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-97916-8_3","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T12:13:24Z","timestamp":1532520804000},"page":"35-47","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem"],"prefix":"10.1007","author":[{"given":"Sota","family":"Onozawa","sequence":"first","affiliation":[]},{"given":"Noboru","family":"Kunihiro","sequence":"additional","affiliation":[]},{"given":"Masayuki","family":"Yoshino","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Naganuma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,26]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the SIGMOD, pp. 563\u2013574 (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"3_CR2","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"Alexandra Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Proceedings of the EUROCRYPT, pp. 224\u2013241 (2009)"},{"key":"3_CR3","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/978-3-642-22792-9_33","volume-title":"Advances in Cryptology \u2013 CRYPTO 2011","author":"Alexandra Boldyreva","year":"2011","unstructured":"Boldyreva, A., Chenette, N., O\u2019Neill, A.: Order-preserving encryption revisited: improved security analysis and alternative solutions. In Proceedings of the CRYPTO, pp. 578\u2013595 (2011)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Karras, P., Malhotra, S., Bhatt, R., Nikitin, A., Antyukhov, D., Idreos, S.: Adaptive indexing over encrypted numeric data. In Proceedings of the SIGMOD, pp. 171\u2013183 (2016)","DOI":"10.1145\/2882903.2882932"},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"563","DOI":"10.1007\/978-3-662-46803-6_19","volume-title":"Advances in Cryptology - EUROCRYPT 2015","author":"Dan Boneh","year":"2015","unstructured":"Boneh, D., Lewi, K., Raykova, M., Sahai, A., Zhandry, M., Zimmerman, J.: Semantically secure order-revealing encryption: multi-input functional encryption without obfuscation. In: Proceedings of the EUROCRYPT, pp. 563\u2013594 (2015)"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1007\/978-3-662-52993-5_24","volume-title":"Fast Software Encryption","author":"Nathan Chenette","year":"2016","unstructured":"Chenette, N., Lewi, K., Weis, S.A., Wu, D.J.: Practical Order-Revealing Encryption with Limited Leakage. In: Proceedings of the FSE, pp. 474\u2013493 (2016)"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Lewi, K., Wu, D.J.: Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds. In: Proceedings of ACM CCS 2016, pp. 1167\u20131178 (2016)","DOI":"10.1145\/2976749.2978376"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Popa, R.A., Redeld, C., Zeldovich, N., Balakrishnan, H.: CryptDB: protecting confidentiality with encrypted query processing. In: Proceedings of the SOSP 2011, pp. 85\u2013100 (2011)","DOI":"10.1145\/2043556.2043566"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the ACM CCS 2015, 644\u2013655 (2015)","DOI":"10.1145\/2810103.2813651"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Horst, C., Kikuchi, R., Xagawa, K.: Cryptanalysis of comparable encryption in SIGMOD 2016. In: Proceedings of SIGMOD 2017, pp. 1069\u20131084 (2017)","DOI":"10.1145\/3035918.3035948"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Bet\u00fcl Durak, F., DuBuisson, T.M., Cash, D.: What else is revealed by order-revealing encryption? In: Proceedings of the ACM CCS, pp. 1155\u20131166 (2016)","DOI":"10.1145\/2976749.2978379"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn, H.W.: The Hungarian method for the assignment problem. Naval Res. Logistics Q. 2, 83\u201387 (1955)","journal-title":"Naval Res. Logistics Q."},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1137\/0105003","volume":"5","author":"J Munkres","year":"1957","unstructured":"Munkres, J.: Algorithms for the assignment and transportation problems. J. Soc. Ind. Appl. Math. 5(1), 32\u201338 (1957)","journal-title":"J. Soc. Ind. Appl. Math."},{"key":"3_CR14","unstructured":"UCI Machine Learning Repository: Adult Data Set. https:\/\/archive.ics.uci.edu\/ml\/datasets\/adult"},{"key":"3_CR15","unstructured":"Privacy Rights Clearinghouse. Chronology of data breaches. http:\/\/www.privacyrights.org\/data-breach"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/375360.375365","volume":"33","author":"G Navarro","year":"2001","unstructured":"Navarro, G.: A guided tour to approximate string matching. ACM Comput. Surv. 33(1), 31\u201388 (2001)","journal-title":"ACM Comput. Surv."},{"key":"3_CR17","first-page":"665","volume":"2017","author":"P Grubbs","year":"2017","unstructured":"Grubbs, P., Sekniqi, K., Bindschaedler, V., Naveed, M., Ristenpart, T.: Leakage-abuse attacks against order-revealing encryption. IEEE Symp. Secur. Priv. 2017, 665\u2013672 (2017)","journal-title":"IEEE Symp. Secur. Priv."},{"key":"3_CR18","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1145\/2810103.2813629","volume":"2015","author":"F Kerschbaum","year":"2015","unstructured":"Kerschbaum, F.: Frequency-hiding order-preserving encryption. ACM Conf. Comput. Commun. Secur. 2015, 656\u2013667 (2015)","journal-title":"ACM Conf. Comput. Commun. Secur."},{"key":"3_CR19","unstructured":"Google, Encrypted BigQueqy. https:\/\/github.com\/google\/encrypted-bigquery-client"},{"key":"3_CR20","unstructured":"Sap AG, SEEED. https:\/\/www.sics.se\/sites\/default\/files\/pub\/andreasschaad.pdf"},{"key":"3_CR21","unstructured":"Microsoft, Always Encrypted SQL Server. https:\/\/docs.microsoft.com\/en-us\/sql\/relational-databases\/security\/encryption\/always-encrypted-database-engine?view=sql-server-2017"}],"container-title":["Lecture Notes in Computer Science","Advances in Information and Computer Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-97916-8_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,28]],"date-time":"2022-08-28T04:56:32Z","timestamp":1661662592000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-97916-8_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319979151","9783319979168"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-97916-8_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}