{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:00:03Z","timestamp":1742950803021,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":14,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811623790"},{"type":"electronic","value":"9789811623806"}],"license":[{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,17]],"date-time":"2021-09-17T00:00:00Z","timestamp":1631836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-2380-6_33","type":"book-chapter","created":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:02:47Z","timestamp":1631782967000},"page":"377-389","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Generalization of Secure Comparison Protocol with Encrypted Output and Its Efficiency Estimation"],"prefix":"10.1007","author":[{"given":"Takumi","family":"Kobayashi","sequence":"first","affiliation":[]},{"given":"Keisuke","family":"Hakuta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,17]]},"reference":[{"issue":"1","key":"33_CR1","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1504\/IJACT.2008.017048","volume":"1","author":"I Damg\u00e5rd","year":"2008","unstructured":"Damg\u00e5rd I, Geisler M, Kr\u00f8ig\u00e5rd M (2008) Homomorphic encryption and secure comparison. Int J Appl Crypt 1(1):22\u201331","journal-title":"Int J Appl Crypt"},{"issue":"4","key":"33_CR2","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1504\/IJACT.2009.028031","volume":"1","author":"I Damg\u00e5rd","year":"2009","unstructured":"Damg\u00e5rd I, Geisler M, Kr\u00f8ig\u00e5rd M (2009) A correction to efficient and secure comparison for on-line auctions. Int J Appl Crypt 1(4):323\u2013324","journal-title":"Int J Appl Crypt"},{"key":"33_CR3","unstructured":"Veugen T (2011) Comparing encrypted data. In: Technical Report, Multimedia Signal Processing Group, Delft University of Technology, The Netherlands, and TNO Information and Communication Technology, Delft, The Netherlands"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Kobayashi T, Hakuta K (2019) Secure comparison protocol with encrypted output and the computation for proceeding 2 bits-by-2 bits. In: Kang B, Jang J (eds) The 19th world conference on information security applications-WISA 2018. LNCS, vol 11402. Springer, Cham, pp 213\u2013228","DOI":"10.1007\/978-3-030-17982-3_17"},{"key":"33_CR5","unstructured":"Goldwasser S, Bellare M (2008) Lecture notes on cryptography 1996\u20132008. http:\/\/cseweb.ucsd.edu\/mihir\/papers\/gb.html"},{"key":"#cr-split#-33_CR6.1","unstructured":"Paillier P (1999) Public-key cryptosystems based on composite degree residuosity classes. In: Stern J"},{"key":"#cr-split#-33_CR6.2","unstructured":"(ed) Advances in cryptology-eurocrypt 1999. LNCS, vol 1592. Springer, Heidelberg, pp 223-238"},{"key":"#cr-split#-33_CR7.1","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd I, Jurik M (2001) A generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In: Kim K","DOI":"10.1007\/3-540-44586-2_9"},{"key":"#cr-split#-33_CR7.2","unstructured":"(ed) Public-key cryptography-PKC 2001. LNCS, vol 1992. Springer, pp 119-136"},{"issue":"2","key":"33_CR8","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1504\/IJACT.2014.062738","volume":"3","author":"T Veugen","year":"2014","unstructured":"Veugen T (2014) Encrypted integer division and secure comparison. Int J Appl Crypt 3(2):166\u2013180","journal-title":"Int J Appl Crypt"},{"key":"33_CR9","unstructured":"National Institute of Standards and Technology, Recommendation for Key Management Part 1: General (Reversion 4), National Institute of Standards and Technology Special Publication 800\u201357, January 2016"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Cohen H, Miyaji A, Ono T (1998) Efficient elliptic curve exponentiation using mixed coordinates. In: Ohta K, Pei D (eds) Advances in cryptology-ASIACRYPT 1998, international conference on the theory and applications of cryptology and information security. LNCS, vol 1514. Springer, Heidelberg, pp 51\u201365","DOI":"10.1007\/3-540-49649-1_6"},{"key":"33_CR11","volume-title":"Handbook of applied cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes AJ, Oorschot PCV, Vanstone SA (1997) Handbook of applied cryptography. CRC Press, Boca Raton"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Erkin Z, Franz M, Katzenbeisser S, Guajardo J, Lagendijk RL, Toft T (2009) Privacy-preserving face recognition. In: Goldberg I, Atallah MJ (eds) Privacy enhancing technologies symposium-PETS 2009. LNCS, vol 5672. Springer, Heidelberg, pp 235\u2013253","DOI":"10.1007\/978-3-642-03168-7_14"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of Sixth International Congress on Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-2380-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,16]],"date-time":"2021-09-16T09:24:53Z","timestamp":1631784293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-2380-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,17]]},"ISBN":["9789811623790","9789811623806"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-2380-6_33","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021,9,17]]},"assertion":[{"value":"17 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}