{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:00:06Z","timestamp":1777964406870,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_18","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:16:01Z","timestamp":1760555761000},"page":"294-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Ranking, Order Statistics, and\u00a0Sorting Under (2, 2)-Threshold Paillier"],"prefix":"10.1007","author":[{"given":"Peiming","family":"Xu","sequence":"first","affiliation":[]},{"given":"Pu","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Huan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Chao","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Zhihong","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"issue":"4","key":"18_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3214303","volume":"51","author":"A Acar","year":"2018","unstructured":"Acar, A., Aksu, H., Uluagac, A.S., Conti, M.: A survey on homomorphic encryption schemes: theory and implementation. ACM Comput. Surv. 51(4), 1\u201335 (2018)","journal-title":"ACM Comput. Surv."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bian, S., et al.: HE3DB: an efficient and elastic encrypted database via arithmetic-and-logic fully homomorphic encryption. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, pp. 2930\u20132944 (2023)","DOI":"10.1145\/3576915.3616608"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Chatterjee, A., Kaushal, M., Sengupta, I.: Accelerating sorting of fully homomorphic encrypted data. In: International Conference on Cryptology in India, pp. 262\u2013273. Springer (2013)","DOI":"10.1007\/978-3-319-03515-4_17"},{"issue":"3","key":"18_CR4","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/TSC.2017.2711018","volume":"13","author":"A Chatterjee","year":"2017","unstructured":"Chatterjee, A., Sengupta, I.: Sorting of fully homomorphic encrypted cloud data: can partitioning be effective? IEEE Trans. Serv. Comput. 13(3), 545\u2013558 (2017)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"18_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/978-3-319-70694-8_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"JH Cheon","year":"2017","unstructured":"Cheon, J.H., Kim, A., Kim, M., Song, Y.: Homomorphic Encryption for Arithmetic of Approximate Numbers. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10624, pp. 409\u2013437. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_15"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Ducas, L., Micciancio, D.: FHEW: bootstrapping homomorphic encryption in less than a second. In: Annual international conference on the theory and applications of cryptographic techniques, pp. 617\u2013640. Springer (2015)","DOI":"10.1007\/978-3-662-46800-5_24"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Emmadi, N., Gauravaram, P., Narumanchi, H., Syed, H.: Updates on sorting of fully homomorphic encrypted data. In: International Conference on Cloud Computing Research and Innovation, pp. 19\u201324. IEEE (2015)","DOI":"10.1109\/ICCCRI.2015.28"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Frimpong, E., Nguyen, K., Budzys, M., Khan, T., Michalas, A.: Guardml: efficient privacy-preserving machine learning services through hybrid homomorphic encryption. In: Proceedings of the 39th ACM\/SIGAPP Symposium on Applied Computing, pp. 953\u2013962 (2024)","DOI":"10.1145\/3605098.3635983"},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"4389","DOI":"10.1109\/TIFS.2021.3106167","volume":"16","author":"S Hong","year":"2021","unstructured":"Hong, S., Kim, S., Choi, J., Lee, Y., Cheon, J.H.: Efficient sorting of homomorphic encrypted data with k-way sorting network. IEEE Trans. Inf. Forensics Secur. 16, 4389\u20134404 (2021)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Jovanovic, N., Fischer, M., Steffen, S., Vechev, M.: Private and reliable neural network inference. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 1663\u20131677 (2022)","DOI":"10.1145\/3548606.3560709"},{"key":"18_CR11","unstructured":"Li, X., Zhao, B., Yang, G., Xiang, T., Weng, J., Deng, R.H.: A survey of secure computation using trusted execution environments. arXiv preprint arXiv:2302.12150 (2023)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Lu, W.j., Huang, Z., Hong, C., Ma, Y., Qu, H.: PEGASUS: bridging polynomial and non-polynomial evaluations in homomorphic encryption. In: IEEE Symposium on Security and Privacy, pp. 1057\u20131073. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00043"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Lu, W.j., Kawasaki, S., Sakuma, J.: Using fully homomorphic encryption for statistical analysis of categorical, ordinal and numerical data. In: Annual Network and Distributed System Security Symposium (2017)","DOI":"10.14722\/ndss.2017.23119"},{"key":"18_CR14","doi-asserted-by":"publisher","unstructured":"LUO\u00a0Hongxuan, JIN\u00a0Xin, Q.B.: A blockchain-based security protection method for smart terminal and smart meter in distribution area. South. Power Syst. Tech. 15(04), 50\u201358 (2021). https:\/\/doi.org\/10.13648\/j.cnki.issn1674-0629.2021.04.007","DOI":"10.13648\/j.cnki.issn1674-0629.2021.04.007"},{"key":"18_CR15","unstructured":"Mazzone, F., Everts, M., Hahn, F., Peter, A.: Efficient ranking, order statistics, and sorting under CKKS. In: USENIX Security Symposium (USENIX Security 25), pp. 791\u2013808 (2025)"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Reagen, B., et al.: Cheetah: optimizing and accelerating homomorphic encryption for private inference. In: 2021 IEEE International Symposium on High-Performance Computer Architecture (HPCA), pp. 26\u201339. IEEE (2021)","DOI":"10.1109\/HPCA51647.2021.00013"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Smart, N.P., Vercauteren, F.: Fully homomorphic encryption with relatively small key and ciphertext sizes. In: International Workshop on Public Key Cryptography, pp. 420\u2013443. Springer (2010)","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, J., et al.: Secure transformer inference made non-interactive. In: Proceedings of the Annual Network annd Distributed System Security Symposium (2025)","DOI":"10.14722\/ndss.2025.230868"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Z., et al.: ArcEDB: an arbitrary-precision encrypted database via (amortized) modular homomorphic encryption. In: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 4613\u20134627 (2024)","DOI":"10.1145\/3658644.3670384"},{"issue":"1","key":"18_CR20","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/MCI.2023.3327892","volume":"19","author":"B Zhao","year":"2024","unstructured":"Zhao, B., Chen, W.N., Li, X., Liu, X., Pei, Q., Zhang, J.: When evolutionary computation meets privacy. IEEE Comput. Intell. Mag. 19(1), 66\u201374 (2024)","journal-title":"IEEE Comput. Intell. Mag."},{"issue":"6","key":"18_CR21","doi-asserted-by":"publisher","first-page":"3638","DOI":"10.1109\/TCYB.2023.3346863","volume":"54","author":"B Zhao","year":"2024","unstructured":"Zhao, B., Chen, W.N., Wei, F.F., Liu, X., Pei, Q., Zhang, J.: PEGA: a privacy-preserving genetic algorithm for combinatorial optimization. IEEE Trans. Cybern. 54(6), 3638\u20133651 (2024)","journal-title":"IEEE Trans. Cybern."},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Zhao, B., Li, J., Xu, P., Li, X., Pei, Q., Shen, Y.: TRUST: a toolkit for TEE-assisted secure outsourced computation over integers. arXiv preprint arXiv:2412.01073 (2024)","DOI":"10.1109\/TIFS.2024.3402173"},{"issue":"4","key":"18_CR23","doi-asserted-by":"publisher","first-page":"1295","DOI":"10.1109\/TR.2023.3258983","volume":"72","author":"B Zhao","year":"2023","unstructured":"Zhao, B., Li, Y., Liu, X., Li, X., Pang, H.H., Deng, R.H.: Identifiable, but not visible: a privacy-preserving person reidentification scheme. IEEE Trans. Reliab. 72(4), 1295\u20131307 (2023)","journal-title":"IEEE Trans. Reliab."},{"issue":"11","key":"18_CR24","doi-asserted-by":"publisher","first-page":"7136","DOI":"10.1109\/TCYB.2022.3224169","volume":"53","author":"B Zhao","year":"2023","unstructured":"Zhao, B., et al.: Primpso: a privacy-preserving multiagent particle swarm optimization algorithm. IEEE Trans. Cybern. 53(11), 7136\u20137149 (2023)","journal-title":"IEEE Trans. Cybern."},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"3637","DOI":"10.1109\/TIFS.2022.3211707","volume":"17","author":"B Zhao","year":"2022","unstructured":"Zhao, B., Yuan, J., Liu, X., Wu, Y., Pang, H.H., Deng, R.H.: SOCI: a toolkit for secure outsourced computation on integers. IEEE Trans. Inf. Forensics Secur. 17, 3637\u20133648 (2022)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:16:07Z","timestamp":1760555767000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}