{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,12]],"date-time":"2025-11-12T13:49:20Z","timestamp":1762955360132,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662447734"},{"type":"electronic","value":"9783662447741"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-662-44774-1_19","type":"book-chapter","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:50:47Z","timestamp":1412686247000},"page":"235-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Restructuring the NSA Metadata Program"],"prefix":"10.1007","author":[{"given":"Seny","family":"Kamara","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2014,10,8]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-642-19571-6_16","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2011","unstructured":"Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 253\u2013273. Springer, Heidelberg (2011)"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Cash, D., Jaeger, J., Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M., Steiner, M.: Dynamic searchable encryption in very-large databases: data structures and implementation. In: Network and Distributed System Security Symposium, NDSS \u201914 (2014)","DOI":"10.14722\/ndss.2014.23264"},{"key":"19_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/978-3-642-17373-8_33","volume-title":"Advances in Cryptology - ASIACRYPT 2010","author":"M Chase","year":"2010","unstructured":"Chase, M., Kamara, S.: Structured encryption and controlled disclosure. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 577\u2013594. Springer, Heidelberg (2010)"},{"key":"19_CR4","unstructured":"Clarke, R., Morell, M., Stone, G., Sunstein, C., Swire, P.: Liberty and security in a changing world (2013). http:\/\/www.whitehouse.gov\/sites\/default\/files\/docs\/2013-12-12_rg_final_report.pdf"},{"key":"19_CR5","unstructured":"United States Foreign Intelligence Surveillance Court. Primary order, April 2013. http:\/\/www.dni.gov\/files\/documents\/PrimaryOrder_Collection_215.pdf"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Curtmola, R., Garay, J., Kamara, S., Ostrovsky, R.: Searchable symmetric encryption: improved definitions and efficient constructions. In: ACM Conference on Computer and Communications Security (CCS \u201906), pp. 79\u201388. ACM (2006)","DOI":"10.1145\/1180405.1180417"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1007\/978-3-540-30576-7_17","volume-title":"Theory of Cryptography","author":"MJ Freedman","year":"2005","unstructured":"Freedman, M.J., Ishai, Y., Pinkas, B., Reingold, O.: Keyword search and oblivious pseudorandom functions. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 303\u2013324. Springer, Heidelberg (2005)"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Gentry, C.: Fully homomorphic encryption using ideal lattices. In: ACM Symposium on Theory of Computing (STOC \u201909), pp, 169\u2013178. ACM Press (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play ANY mental game. In: ACM Symposium on the Theory of Computation (STOC \u201987), pp. 218\u2013229 (1987)","DOI":"10.1145\/28395.28420"},{"key":"19_CR10","unstructured":"Greenwald, G.: NSA collecting phone records of millions of verizon customers daily, July 2013. http:\/\/www.theguardian.com\/world\/2013\/jun\/06\/nsa-phone-records-verizon-court-order"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Jarecki, S., Jutla, C., Krawczyk, H., Rosu, M., Steiner, M.: Outsourced symmetric private information retrieval. In: ACM Conference on Computer and Communications Security (CCS \u201913), pp. 875\u2013888 (2013)","DOI":"10.1145\/2508859.2516730"},{"key":"19_CR12","unstructured":"Kamara, S.: Are compliance and privacy always at odds? July 2013. http:\/\/outsourcedbits.org\/2013\/07\/23\/are-compliance-and-privacy-always-at-odds\/"},{"key":"19_CR13","series-title":"LNCS","first-page":"235","volume-title":"FC 2014 Workshops","author":"S Kamara","year":"2014","unstructured":"Kamara, S.: Restructuring the NSA metadata program. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 235\u2013248. Springer, Heidelberg (2014). http:\/\/research.microsoft.com\/en-us\/projects\/metacrypt\/"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Kamara, S., Papamanthou, C., Roeder, T.: Dynamic searchable symmetric encryption. In: ACM Conference on Computer and Communications Security (CCS \u201912). ACM Press (2012)","DOI":"10.1145\/2382196.2382298"},{"key":"19_CR15","unstructured":"Kroll, J., Felten, E., Boneh, D.: Secure protocols for accountable warrant execution, April 2014. http:\/\/www.cs.princeton.edu\/~felten\/warrant-paper.pdf"},{"key":"19_CR16","unstructured":"Office of the Inspector General of the Department of Defense. Requirements for the trailblazer and thinthread systems (2004). https:\/\/www.fas.org\/irp\/agency\/dod\/ig-thinthread.pdf"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Yao, A.: Theory and application of trapdoor functions. In: IEEE Symposium on Foundations of Computer Science (FOCS \u201982), pp. 80\u201391. IEEE Computer Society (1982)","DOI":"10.1109\/SFCS.1982.45"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-44774-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T23:06:18Z","timestamp":1676415978000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-44774-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783662447734","9783662447741"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-44774-1_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 October 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}