{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:34:40Z","timestamp":1725593680177},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_23","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T02:07:06Z","timestamp":1309226826000},"page":"190-197","source":"Crossref","is-referenced-by-count":16,"title":["Cryptography Goes to the Cloud"],"prefix":"10.1007","author":[{"given":"Isaac","family":"Agudo","sequence":"first","affiliation":[]},{"given":"David","family":"Nu\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Giammatteo","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Rizomiliotis","sequence":"additional","affiliation":[]},{"given":"Costas","family":"Lambrinoudakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Yao, A.C.-C.: How to generate and exchange secrets. In: Foundations of Computer Science (FOCS 1986), pp. 162\u2013167 (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"23_CR2","unstructured":"van Dijk, M., Juels, A.: On the impossibility of cryptography alone for privacy-preserving cloud computing. In: Hot Topics in Security (HotSec 2010), pp. 1\u20138. USENIX Association (2010)"},{"key":"23_CR3","unstructured":"Gentry, C., Halevi, S.: Implementing Gentry\u2019s fully-homomorphic encryption scheme. Cryptology ePrint Archive, Report 2010\/520 (2010), http:\/\/eprint.iacr.org\/2010\/520"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/978-3-540-30576-7_18","volume-title":"Theory of Cryptography","author":"D. Boneh","year":"2005","unstructured":"Boneh, D., Goh, E.-J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 325\u2013341. Springer, Heidelberg (2005)"},{"key":"23_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/978-3-642-13013-7_25","volume-title":"Public Key Cryptography \u2013 PKC 2010","author":"N. Smart","year":"2010","unstructured":"Smart, N., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: Nguyen, P.Q., Pointcheval, D. (eds.) PKC 2010. LNCS, vol.\u00a06056, pp. 420\u2013443. Springer, Heidelberg (2010)"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2010","author":"M. Dijk van","year":"2010","unstructured":"van Dijk, M., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Gilbert, H. (ed.) EUROCRYPT 2010. LNCS, vol.\u00a06110, pp. 24\u201343. Springer, Heidelberg (2010)"},{"key":"23_CR7","unstructured":"Bugiel, S., Nurnberger, S., Sadeghi, A.R., Schneide, T.: Twin Clouds: An Architecture for Secure Cloud Computing. In: Workshop on Cryptography and Security in Clouds, Zurich, March 15-16 (2011)"},{"issue":"6","key":"23_CR8","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. J. ACM\u00a045(6), 965\u2013981 (1998)","journal-title":"J. ACM"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of 38th Annual Symposium on Foundations of Computer Science, pp. 364\u2013373 (1997)","DOI":"10.1109\/SFCS.1997.646125"},{"key":"23_CR10","first-page":"44","volume-title":"21st Symp. on Security and Privacy (S&P)","author":"D.X. Song","year":"2000","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: 21st Symp. on Security and Privacy (S&P), Berkeley, California, pp. 44\u201355. IEEE Computer Society, Los Alamitos (2000)"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J.A., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: 13th ACM Conference on Computer and Communications Security (CCS 2006), pp. 79\u201388 (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"23_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1007\/978-3-540-24676-3_30","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"D. Boneh","year":"2004","unstructured":"Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 506\u2013522. Springer, Heidelberg (2004)"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-540-77026-8_21","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"G. Crescenzo Di","year":"2007","unstructured":"Di Crescenzo, G., Saraswat, V.: Public Key Encryption with Searchable Keywords Based on Jacobi Symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 282\u2013296. Springer, Heidelberg (2007)"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1145\/1533057.1533108","volume-title":"ASIACCS","author":"H.S. Rhee","year":"2009","unstructured":"Rhee, H.S., Park, J.H., Susilo, W., Lee, D.H.: Improved searchable public key encryption with designated tester. In: ASIACCS, pp. 376\u2013379. ACM, New York (2009)"},{"key":"23_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D. Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol.\u00a04392, pp. 535\u2013554. Springer, Heidelberg (2007)"},{"key":"23_CR16","unstructured":"Jeffery, K., Neidecker-Lutz, B.: The Future Of Cloud Computing, Opportunities For European Cloud Computing Beyond (2010), http:\/\/cordis.europa.eu\/fp7\/ict\/ssai\/docs\/cloud-report-final.pdf"},{"key":"23_CR17","unstructured":"Chen, Y., Paxson, V., Katz, R.H.: What\u2019s New About Cloud Computing Security? Technical Report No. UCB\/EECS-2010-5, (January 20, 2010), http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2010\/EECS-2010-5.html"},{"key":"23_CR18","unstructured":"RSA, The Role of Security in Trustworthy Cloud Computing"},{"key":"23_CR19","unstructured":"Oladimeji, E.A.: Security threat Modeling and Analysis: A goal-oriented approach (2006)"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Shamir, A.: How to share a secret. Commun. ACM, 612\u2013613 (1979)","DOI":"10.1145\/359168.359176"},{"key":"23_CR22","unstructured":"Plank, J.S., Luo, J., Schuman, C.D., Xu, L., Wilcox-O\u2019Hearn, Z.: A Performance Evaluation and Examination of Open-Source Erasure Coding Libraries For Storage (2009)"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Galiero, G., Giammatteo, G.: Trusting third-party storage providers for holding personal information. A Context-based Approach to Protect Identity-related Data in Untrusted Domains, Identity in the Information Society 2(2), 99\u2013114","DOI":"10.1007\/s12394-009-0033-3"}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T12:25:01Z","timestamp":1560342301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}