{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,4]],"date-time":"2026-01-04T02:49:29Z","timestamp":1767494969305,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/csnet.2018.8602714","type":"proceedings-article","created":{"date-parts":[[2019,1,8]],"date-time":"2019-01-08T20:10:27Z","timestamp":1546978227000},"page":"1-8","source":"Crossref","is-referenced-by-count":7,"title":["Privacy-Preserving Tax Calculations in Smart Cities by Means of Inner-Product Functional Encryption"],"prefix":"10.1109","author":[{"given":"Oana","family":"Stan","sequence":"first","affiliation":[]},{"given":"Renaud","family":"Sirdey","sequence":"additional","affiliation":[]},{"given":"Cedric","family":"Gouy-Pailler","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Blanchart","sequence":"additional","affiliation":[]},{"given":"Amira","family":"BenHamida","sequence":"additional","affiliation":[]},{"given":"Mohamed-Haykel","family":"Zayani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Circuit-abe from lwe: Unbounded attributes and semi-adaptive security","author":"brakerski","year":"2016","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref11","article-title":"Predicate encryption supporting disjunctions, polynomial equations, and inner products","author":"katz","year":"2007","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1007\/978-3-662-46447-2_34","article-title":"Predicate encryption for multidimensional range queries from lattices","volume":"9020","author":"gay","year":"2015","journal-title":"Public Key Cryptography Ser Lecture Notes in Computer Science"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48329-2_40"},{"key":"ref14","article-title":"Simple functional encryption schemes for inner products","author":"abdalla","year":"2015","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref15","article-title":"Practical functional encryption for quadratic functions with applications to predicate encryption","author":"baltico","year":"2017","journal-title":"Cryptology ePrint Archive Report"},{"journal-title":"Tech Rep","article-title":"Environmental taxation: A guide for policy makers","year":"2011","key":"ref16"},{"year":"2011","key":"ref17"},{"journal-title":"Rte eco2mix annuel definitif 2015-france energy consumption","year":"2017","key":"ref18"},{"journal-title":"Insee statistiques","year":"2017","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/28395.28420"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1007\/978-3-642-14623-7_6","article-title":"Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical ibe","author":"agrawal","year":"2010","journal-title":"Advances in Cryptology-CRYPTO 2010"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/978-3-642-22792-9_29","article-title":"Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages","volume":"6841","author":"brakerski","year":"2011","journal-title":"CRYPTO Ser Lecture Notes in Computer Science"},{"key":"ref8","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques ser EUROCRYPT'05"},{"key":"ref7","first-page":"213","article-title":"Identity-based encryption from the weil pairing","author":"boneh","year":"2001","journal-title":"Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology Ser CRYPTO '01"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1982.38"},{"key":"ref1","article-title":"Fully secure functional encryption for inner products, from standard assumptions","author":"agrawal","year":"2015","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref9","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography PKC'11"},{"journal-title":"Institut prive d&#x2019;&#x00E9;tudes &#x00E9;conomiques","year":"2017","key":"ref20"},{"journal-title":"International Energy Agency","year":"2017","key":"ref21"}],"event":{"name":"2018 2nd Cyber Security in Networking Conference (CSNet)","start":{"date-parts":[[2018,10,24]]},"location":"Paris","end":{"date-parts":[[2018,10,26]]}},"container-title":["2018 2nd Cyber Security in Networking Conference (CSNet)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8574117\/8602668\/08602714.pdf?arnumber=8602714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,25]],"date-time":"2022-01-25T20:27:16Z","timestamp":1643142436000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8602714\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/csnet.2018.8602714","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}