{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T19:04:36Z","timestamp":1768071876343,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662533567","type":"print"},{"value":"9783662533574","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-662-53357-4_17","type":"book-chapter","created":{"date-parts":[[2016,8,30]],"date-time":"2016-08-30T09:22:01Z","timestamp":1472548921000},"page":"253-270","source":"Crossref","is-referenced-by-count":5,"title":["Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM"],"prefix":"10.1007","author":[{"given":"Gamze","family":"Tillem","sequence":"first","affiliation":[]},{"given":"\u00d6mer Mert","family":"Candan","sequence":"additional","affiliation":[]},{"given":"Erkay","family":"Sava\u015f","sequence":"additional","affiliation":[]},{"given":"Kamer","family":"Kaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,31]]},"reference":[{"key":"17_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/978-3-642-01001-9_13","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"A Boldyreva","year":"2009","unstructured":"Boldyreva, A., Chenette, N., Lee, Y., O\u2019Neill, A.: Order-preserving symmetric encryption. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 224\u2013241. Springer, Heidelberg (2009). http:\/\/dx.doi.org\/10.1007\/978-3-642-01001-9_13"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1007\/978-3-540-70936-7_29","volume-title":"Theory of Cryptography","author":"D Boneh","year":"2007","unstructured":"Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535\u2013554. Springer, Heidelberg (2007). http:\/\/dl.acm.org\/citation.cfm?id=1760749.1760788"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1007\/3-540-44586-2_9","volume-title":"Public Key Cryptography","author":"I Damg\u00e5rd","year":"2001","unstructured":"Damg\u00e5rd, I., Jurik, M.: A generalisation, a simplification and some applications of Paillier\u2019s probabilistic public-key system. In: Kim, K. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119\u2013136. Springer, Heidelberg (2001). http:\/\/dl.acm.org\/citation.cfm?id=648118.746742"},{"key":"17_CR4","unstructured":"Hac\u0131g\u00fcm\u00fc\u015f, H., Iyer, B., Li, C., Mehrotra, S.: Executing SQL over encrypted data in the database-service-provider model. In: Proceedings of 2002 ACM SIGMOD International Conference on Management of Data, SIGMOD 2002, Madison, Wisconsin, 3\u20136 June 2002, pp. 216\u2013227. ACM (2002). http:\/\/doi.acm.org\/10.1145\/564691.564717"},{"issue":"3","key":"17_CR5","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1007\/s00778-011-0245-7","volume":"21","author":"B Hore","year":"2012","unstructured":"Hore, B., Mehrotra, S., Can\u0131m, M., Kantarc\u0131o\u011flu, M.: Secure multidimensional range queries over outsourced data. VLDB J. 21(3), 333\u2013358 (2012). http:\/\/dx.doi.org\/10.1007\/s00778-011-0245-7","journal-title":"VLDB J."},{"key":"17_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/978-3-642-14423-3_14","volume-title":"Information, Security and Cryptology \u2013 ICISC 2009","author":"H Lipmaa","year":"2010","unstructured":"Lipmaa, H.: First CPIR protocol with data-dependent computation. In: Lee, D., Hong, S. (eds.) ICISC 2009. LNCS, vol. 5984, pp. 193\u2013210. Springer, Heidelberg (2010). http:\/\/dl.acm.org\/citation.cfm?id=1883749.1883769"},{"key":"17_CR7","unstructured":"Stefanov, E., van Dijk, M., Shi, E., Fletcher, C., Ren, L., Yu, X., Devadas, S.: Path ORAM: an extremely simple oblivious RAM protocol. In: Proceedings of 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4\u20138 November 2013. pp. 299\u2013310. ACM (2013). http:\/\/doi.acm.org\/10.1145\/2508859.2516660"},{"key":"17_CR8","unstructured":"TPC-H: Decision Support Benchmark. http:\/\/www.tpc.org\/tpch"},{"issue":"6","key":"17_CR9","doi-asserted-by":"publisher","first-page":"1727","DOI":"10.1109\/TPDS.2015.2456021","volume":"27","author":"E \u00dcnal","year":"2016","unstructured":"\u00dcnal, E., Sava\u015f, E.: On acceleration and scalability of number theoretic private information retrieval. IEEE Trans. Parallel Distrib. Syst. 27(6), 1727\u20131741 (2016). doi: 10.1109\/TPDS.2015.2456021","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Capitani, D., di Vimercati, S., Foresti, S., Paraboschi, S., Pelosi, G., Samarati, P.: Efficient and private access to outsourced data. In: Proceedings of 2011 31st International Conference on Distributed Computing Systems, ICDCS 2011, pp. 710\u2013719 (2011). http:\/\/dx.doi.org\/10.1109\/ICDCS.2011.37","DOI":"10.1109\/ICDCS.2011.37"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-53357-4_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T17:38:44Z","timestamp":1498325924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-53357-4_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783662533567","9783662533574"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-53357-4_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}