{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:51:43Z","timestamp":1740099103751,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319983844"},{"type":"electronic","value":"9783319983851"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_4","type":"book-chapter","created":{"date-parts":[[2018,7,25]],"date-time":"2018-07-25T23:47:49Z","timestamp":1532562469000},"page":"39-54","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes"],"prefix":"10.1007","author":[{"given":"Frank","family":"Pallas","sequence":"first","affiliation":[]},{"given":"Martin","family":"Grambow","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Moghadam, S.S., Gavint, G., Darmonti, J.: A secure order-preserving indexing scheme for outsourced data. In: IEEE International Carnahan Conference on Security Technology (ICCST 2016), pp. 1\u20137. IEEE (2016)","DOI":"10.1109\/CCST.2016.7815719"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"C Gentry","year":"2011","unstructured":"Gentry, C., Halevi, S.: Implementing gentry\u2019s fully-homomorphic encryption scheme. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 129\u2013148. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_9"},{"issue":"2","key":"4_CR3","first-page":"163","volume":"7","author":"G Spindler","year":"2016","unstructured":"Spindler, G., Schmechel, P.: Personal data and encryption in the European general data protection regulation. JIPITEC 7(2), 163\u2013177 (2016)","journal-title":"JIPITEC"},{"key":"4_CR4","unstructured":"Bonfanti, M.E.: Let\u2019s go for new or emerging security technologies!... what about their impact on individuals and the society? In: Democrazia e Sicurezza-Democracy and Security Review, no. 2 (2017)"},{"key":"4_CR5","volume-title":"Human Rights and Encryption","author":"W Schulz","year":"2016","unstructured":"Schulz, W., van Hoboken, J.: Human Rights and Encryption. UNESCO, Paris (2016)"},{"key":"4_CR6","unstructured":"Acquisto, G.D., Domingo-Ferrer, J., Kikiras, P., Torra, V., de Montjoye, Y.A., Bourka, A.: Privacy by design in big data - an overview of privacy enhancing technologies in the era of big data analytics. ENISA (2015)"},{"key":"4_CR7","unstructured":"Danezis, G., et al.: Privacy and data protection by design - from policy to engineering. ENISA (2014)"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"4_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of paillier\u2019s probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119\u2013136. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-44586-2_9"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 113\u2013124. ACM, New York (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/978-3-662-46800-5_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"S Halevi","year":"2015","unstructured":"Halevi, S., Shoup, V.: Bootstrapping for HElib. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 641\u2013670. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_25"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Roche, D.S., Apon, D., Choi, S.G., Yerukhimovich, A.: POPE: partial order preserving encoding. In: Proceedings of the 2016 SIGSAC Conference on Computer and Communications Security, pp. 1131\u20131142. ACM (2016)","DOI":"10.1145\/2976749.2978345"},{"key":"4_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-69459-7_1","volume-title":"On the Move to Meaningful Internet Systems","author":"T Waage","year":"2017","unstructured":"Waage, T., Wiese, L.: Property preserving encryption in NoSQL wide column stores. In: Panetto, H., et al. (eds.) OTM 2017. LNCS, vol. 10574, pp. 3\u201321. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-69459-7_1"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Pallas, F., G\u00fcnther, J., Bermbach, D.: Pick your choice in HBase: security or performance. In: IEEE International Conference on Big Data, pp. 548\u2013554 (2016)","DOI":"10.1109\/BigData.2016.7840646"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"M\u00fcller, S., Bermbach, D., Tai, S., Pallas, F.: Benchmarking the performance impact of transport layer security in cloud database systems. In: IEEE International Conference on Cloud Engineering (IC2E), pp. 27\u201336 (2014)","DOI":"10.1109\/IC2E.2014.48"},{"key":"4_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-319-17040-4_20","volume-title":"Foundations and Practice of Security","author":"T Waage","year":"2015","unstructured":"Waage, T., Wiese, L.: Benchmarking encrypted data storage in HBase and Cassandra with YCSB. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P.W.L. (eds.) FPS 2014. LNCS, vol. 8930, pp. 311\u2013325. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17040-4_20"},{"key":"4_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-55483-9","volume-title":"Cloud Service Benchmarking: Measuring Quality of Cloud Services from a Client Perspective","author":"D Bermbach","year":"2017","unstructured":"Bermbach, D., Wittern, E., Tai, S.: Cloud Service Benchmarking: Measuring Quality of Cloud Services from a Client Perspective. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-319-55483-9"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Pallas, F., Bermbach, D., M\u00fcller, S., Tai, S.: Evidence-based security configurations for cloud datastores. In: Proceedings of the Symposium on Applied Computing, SAC 2017, pp. 424\u2013430. ACM (2017)","DOI":"10.1145\/3019612.3019654"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 563\u2013574. ACM (2004)","DOI":"10.1145\/1007568.1007632"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Kerschbaum, F.: Frequency-hiding order-preserving encryption. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 656\u2013667. ACM (2015)","DOI":"10.1145\/2810103.2813629"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Malkin, T., Teranishi, I., Yung, M.: Order-preserving encryption secure beyond one-wayness. IACR Cryptology ePrint Archive (2013)","DOI":"10.1007\/978-3-662-45608-8_3"},{"key":"4_CR22","unstructured":"Armknecht, F., et al.: A guide to fully homomorphic encryption. IACR Cryptology ePrint Archive, p. 1192 (2015)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Tonyali, S., Saputro, N., Akkaya, K.: Assessing the feasibility of fully homomorphic encryption for smart grid AMI networks. In: International Conference on Ubiquitous and Future Networks, pp. 591\u2013596 (2015)","DOI":"10.1109\/ICUFN.2015.7182613"},{"key":"4_CR24","unstructured":"Deng, P., Yang, L.: A secure and privacy-preserving communication scheme for advanced metering infrastructure. In: IEEE PES Innovative Smart Grid Technologies (ISGT), pp. 1\u20135 (2012)"},{"key":"4_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1007\/978-3-662-46800-5_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2015","author":"L Ducas","year":"2015","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9056, pp. 617\u2013640. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46800-5_24"},{"key":"4_CR26","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (Leveled) fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pp. 309\u2013325. ACM (2012)","DOI":"10.1145\/2090236.2090262"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T04:32:11Z","timestamp":1571632331000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]}}}