{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:41:50Z","timestamp":1762033310464},"publisher-location":"New Delhi","reference-count":21,"publisher":"Springer India","isbn-type":[{"type":"print","value":"9788132226932"},{"type":"electronic","value":"9788132226956"}],"license":[{"start":{"date-parts":[[2015,10,25]],"date-time":"2015-10-25T00:00:00Z","timestamp":1445731200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2695-6_49","type":"book-chapter","created":{"date-parts":[[2015,10,24]],"date-time":"2015-10-24T20:41:10Z","timestamp":1445719270000},"page":"579-585","source":"Crossref","is-referenced-by-count":2,"title":["Privacy Preserving Spam Email Filtering Based on Somewhat Homomorphic Using Functional Encryption"],"prefix":"10.1007","author":[{"given":"Sumit","family":"Jaiswal","sequence":"first","affiliation":[]},{"given":"Subhash Chandra","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Ravi Shankar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,25]]},"reference":[{"issue":"3","key":"49_CR1","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1016\/j.future.2010.12.006","volume":"28","author":"D Zissis","year":"2012","unstructured":"Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583\u2013592 (2012)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"49_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R., Konwinski, A., Zaharia, M.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"issue":"2","key":"49_CR3","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1016\/0022-0000(88)90005-0","volume":"37","author":"G Brassard","year":"1988","unstructured":"Brassard, G., Chaum, D., Crpeau, C.: Minimum disclosure proofs of knowledge. J. Comput. Syst. Sci. 37(2), 156\u2013189 (1988)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"49_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"issue":"6","key":"49_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. Inf. Theory, IEEE Trans. 22(6), 644\u2013654 (1976)","journal-title":"Inf. Theory, IEEE Trans."},{"key":"49_CR6","doi-asserted-by":"crossref","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. Doctoral dissertation, Stanford University (2009)","DOI":"10.1145\/1536414.1536440"},{"key":"49_CR7","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"Rosario Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Advances in Cryptology CRYPTO, pp. 465-482. Springer, Berlin (2010)"},{"key":"49_CR8","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1007\/978-3-642-19571-6_16","volume-title":"Theory of Cryptography","author":"Dan Boneh","year":"2011","unstructured":"Boneh, D., Sahai, A., Waters, B.: Functional encryption: definitions and challenges. In: Theory of Cryptography, pp. 253-273. Springer, Berlin (2011)"},{"key":"49_CR9","first-page":"457","volume-title":"Lecture Notes in Computer Science","author":"Amit Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Advances in Cryptology EUROCRYPT 2005, pp. 457\u2013473. Springer, Berlin (2005)"},{"key":"49_CR10","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1007\/978-3-642-14623-7_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"Kai-Min Chung","year":"2010","unstructured":"Chung, K.M., Kalai, Y., Vadhan, S.: Improved delegation of computation using fully homomorphic encryption. In: Advances in Cryptology CRYPTO 2010, pp. 483\u2013501. Springer, Berlin (2010)"},{"key":"49_CR11","first-page":"114","volume-title":"Lecture Notes in Computer Science","author":"Brent Waters","year":"2005","unstructured":"Waters, B.: Efficient identity-based encryption without random oracles. In: Advances in Cryptology EUROCRYPT 2005, pp. 114\u2013127. Springer, Berlin (2005)"},{"key":"49_CR12","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"Craig Gentry","year":"2011","unstructured":"Gentry, C., Halevi, S.: Implementing Gentrys fully-homomorphic encryption scheme. In: Advances in Cryptology EUROCRYPT 2011, pp. 129-148. Springer, Berlin (2011)"},{"key":"49_CR13","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology \u2014 CRYPTO 2001","author":"Dan Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Advances in Cryptology CRYPTO 2001, pp. 213\u2013229. Springer, Berlin (2001)"},{"key":"49_CR14","doi-asserted-by":"crossref","unstructured":"Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B. Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 2013 IEEE 54th Annual Symposium on Foundations of Computer Science (FOCS), pp. 40\u201349. IEEE (2013)","DOI":"10.1109\/FOCS.2013.13"},{"key":"49_CR15","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, pp. 89\u201398. ACM (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"49_CR16","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B. Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, 2007, SP\u201907, pp. 321\u2013334. IEEE (2007)","DOI":"10.1109\/SP.2007.11"},{"issue":"3","key":"49_CR17","doi-asserted-by":"publisher","first-page":"690","DOI":"10.1145\/116825.116852","volume":"38","author":"O Goldreich","year":"1991","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems. J. ACM (JACM) 38(3), 690\u2013728 (1991)","journal-title":"J. ACM (JACM)"},{"key":"49_CR18","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/978-3-642-40084-1_26","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"Dan Boneh","year":"2013","unstructured":"Boneh, D., Raghunathan, A., Segev, G.: Function-private identity-based encryption: hiding the function in functional encryption. In: Advances in Cryptology CRYPTO 2013, pp. 461\u2013478. Springer, Berlin (2013)"},{"key":"49_CR19","unstructured":"Sobel,W.: System utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection, uS Patent 7,293,063 (6 Nov 2007)"},{"key":"49_CR20","doi-asserted-by":"publisher","unstructured":"Ma, W., Tran, D., Sharma, D.: A novel spam email detection system based on negative selection. In: Fourth International Conference on Computer Sciences and Convergence Information Technology, 2009. ICCIT\u201909, pp. 987\u2013992 (2009) doi:\n                    10.1109\/ICCIT.2009.58","DOI":"10.1109\/ICCIT.2009.58"},{"key":"49_CR21","doi-asserted-by":"publisher","unstructured":"Sasaki, M., Shinnou, H., Spam detection using text clustering. In: International Conference on Cyberworlds, 2005, pp. 4, pp.\u2013319 (2005). doi:\n                    10.1109\/CW.2005.83","DOI":"10.1109\/CW.2005.83"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2695-6_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T05:05:16Z","timestamp":1559279116000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2695-6_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,25]]},"ISBN":["9788132226932","9788132226956"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2695-6_49","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015,10,25]]}}}