{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T20:44:28Z","timestamp":1749847468292},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642554148"},{"type":"electronic","value":"9783642554155"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55415-5_5","type":"book-chapter","created":{"date-parts":[[2014,5,12]],"date-time":"2014-05-12T02:18:10Z","timestamp":1399861090000},"page":"52-65","source":"Crossref","is-referenced-by-count":22,"title":["Multi-keyword Similarity Search over Encrypted Cloud Data"],"prefix":"10.1007","author":[{"given":"Mikhail","family":"Strizhov","sequence":"first","affiliation":[]},{"given":"Indrajit","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"5_CR1","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/s00145-007-9006-6","volume":"21","author":"M. Abdalla","year":"2008","unstructured":"Abdalla, M., Bellare, M., Catalano, D., Kiltz, E., Kohno, T., Lange, T., Malone-Lee, J., Neven, G., Paillier, P., Shi, H.: Searchable encryption revisited: consistency properties, relation to anonymous ibe, and extensions. Journal of Cryptology\u00a021(3), 350\u2013391 (2008)","journal-title":"Journal of Cryptology"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order-preserving encryption for numeric data. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France (June 2004)","DOI":"10.1145\/1007568.1007632"},{"key":"5_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-540-74143-5_30","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Boldyreva, A., O\u2019Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 535\u2013552. Springer, Heidelberg (2007)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Blanton, M.: Achieving full security in privacy-preserving data mining. In: Proceedings of the 3rd IEEE International Conference on Privacy, Security, Risk and Trust, Boston, MA, USA (October 2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.12"},{"key":"5_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/978-3-642-33167-1_29","volume-title":"Computer Security \u2013 ESORICS 2012","author":"M. Blanton","year":"2012","unstructured":"Blanton, M., Atallah, M.J., Frikken, K.B., Malluhi, Q.: Secure and efficient outsourcing of sequence comparisons. In: Foresti, S., Yung, M., Martinelli, F. (eds.) ESORICS 2012. LNCS, vol.\u00a07459, pp. 505\u2013522. Springer, Heidelberg (2012)"},{"key":"5_CR6","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Proceedings of the 4th IACR Theory of Cryptography Conference, Amsterdam, The Netherlands (February 2007)"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","volume-title":"Advances in Cryptology \u2013 CRYPTO 2012","author":"Z. Brakerski","year":"2012","unstructured":"Brakerski, Z.: Fully homomorphic encryption without modulus switching from classical gapsvp. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol.\u00a07417, pp. 868\u2013886. Springer, Heidelberg (2012)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: Fully homomorphic encryption without bootstrapping. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, Cambridge, MA, USA (2012)","DOI":"10.1145\/2090236.2090262"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Cao, N., Wang, C., Li, M., Ren, K., Lou, W.: Privacy-preserving multi-keyword ranked search over encrypted cloud data. In: Proceedings of the 30th IEEE International Conference on Computer Communications, Shanghai, China (April 2011)","DOI":"10.1109\/INFCOM.2011.5935306"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1007\/11496137_30","volume-title":"Applied Cryptography and Network Security","author":"Y.-C. Chang","year":"2005","unstructured":"Chang, Y.-C., Mitzenmacher, M.: Privacy preserving keyword searches on remote encrypted data. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol.\u00a03531, pp. 442\u2013455. Springer, Heidelberg (2005)"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-540-77026-8_21","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2007","author":"G. Crescenzo Di","year":"2007","unstructured":"Di Crescenzo, G., Saraswat, V.: Public key encryption with searchable keywords based on jacobi symbols. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol.\u00a04859, pp. 282\u2013296. Springer, Heidelberg (2007)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: Improved definitions and efficient constructions. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA (October 2006)","DOI":"10.1145\/1180405.1180417"},{"key":"5_CR13","unstructured":"di Vimercati, S.D.C., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Private data indexes for selective access to outsourced data. In: Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, Chicago, IL, USA (October 2011)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. PhD thesis, Stanford University (2009), http:\/\/crypto.stanford.edu\/craig","DOI":"10.1145\/1536414.1536440"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: Proceedings of the 41st Annual ACM Symposium on Theory of Computing, Bethesda, MD (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"5_CR16","unstructured":"Goh, E.-J.: Secure indexes. Cryptology ePrint Archive, Report 2003\/216 (2003), http:\/\/eprint.iacr.org\/2003\/216\/"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Goldreich, O.: The foundations of cryptography. Basic Applications, vol.\u00a02. Cambridge University Press (2004)","DOI":"10.1017\/CBO9780511721656"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Grossman, D.A., Frieder, O.: Information retrieval: algorithms and heuristics. Kluwer international series on information retrieval. Springer (2004)","DOI":"10.1007\/978-1-4020-3005-5"},{"key":"5_CR19","unstructured":"Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall\/CRC Cryptography and Network Security Series. Chapman & Hall\/CRC (2007)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Kuzu, M., Islam, M.S., Kantarcioglu, M.: Efficient similarity search over encrypted data. In: Proceedings of the 28th IEEE International Conference on Data Engineering, Washington, DC, USA (April 2012)","DOI":"10.1109\/ICDE.2012.23"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Moataz, T., Shikfa, A.: Boolean symmetric searchable encryption. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Hangzhou, China (May 2013)","DOI":"10.1145\/2484313.2484347"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Orencik, C., Kantarcioglu, M., Savas, E.: A practical and secure multi-keyword search method over encrypted cloud data. In: Proceedings of the 6th IEEE International Conference on Cloud Computing, Santa Clara, CA, USA (June 2013)","DOI":"10.1109\/CLOUD.2013.18"},{"key":"5_CR23","unstructured":"Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, Berkeley, CA, USA (May 2000)"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Swaminathan, A., Mao, Y., Su, G.-M., Gou, H., Varna, A.L., He, S., Wu, M., Oard, D.W.: Confidentiality-preserving rank-ordered search. In: Proceedings of the ACM Workshop on Storage Security and Survivability, Alexandria, Virginia, USA (2007)","DOI":"10.1145\/1314313.1314316"},{"issue":"8","key":"5_CR25","doi-asserted-by":"publisher","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","volume":"23","author":"C. Wang","year":"2012","unstructured":"Wang, C., Cao, N., Ren, K., Lou, W.: Enabling secure and efficient ranked keyword search over outsourced cloud data. IEEE Transactions on Parallel and Distributed Systems\u00a023(8), 1467\u20131479 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Wang, C., Ren, K., Yu, S., Urs, K.M.R.: Achieving usable and privacy-assured similarity search over outsourced cloud data. In: Proceedings of the 31st Annual IEEE International Conference on Computer Communications, Orlando, FL, USA (March 2012)","DOI":"10.1109\/INFCOM.2012.6195784"},{"key":"5_CR27","volume-title":"Managing gigabytes : compressing and indexing documents and images","author":"I.H. Witten","year":"1999","unstructured":"Witten, I.H., Moffat, A., Bell, T.C.: Managing gigabytes: compressing and indexing documents and images, 2nd edn. Morgan Kaufmann, San Francisco (1999)","edition":"2"},{"key":"5_CR28","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/281250.281256","volume":"32","author":"J. Zobel","year":"1998","unstructured":"Zobel, J., Moffat, A.: Exploring the similarity space. SIGIR FORUM\u00a032, 18\u201334 (1998)","journal-title":"SIGIR FORUM"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55415-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,19]],"date-time":"2020-08-19T08:32:01Z","timestamp":1597825921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55415-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642554148","9783642554155"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55415-5_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}