{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T09:34:25Z","timestamp":1729676065457,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/iccomm.2016.7528211","type":"proceedings-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:27:58Z","timestamp":1470421678000},"page":"291-296","source":"Crossref","is-referenced-by-count":4,"title":["A FHE-based evaluation for searching on encrypted data"],"prefix":"10.1109","author":[{"given":"Mihai","family":"Togan","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICComm.2014.6866760"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536461"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-13190-5_1","article-title":"On Ideal Lattices And Learning With Errors Over Rings","volume":"6110","author":"lyubashevsky","year":"2010","journal-title":"Advances in Cryptology-EUROCRYPT 2010"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-642-13190-5_2","article-title":"Fully Homomorphic Encryption Over The Integers","volume":"6110","author":"dijk","year":"2010","journal-title":"Advances in Cryptology-EUROCRYPT 2010"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_29"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref15","article-title":"Somewhat practical fully homomorphic encryption","author":"fan","year":"2012","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-38980-1_7","article-title":"Private database queries using somewhat homomorphic encryption","author":"boneh","year":"2013","journal-title":"The 11th International Conference on Applied Cryptography and Network Security &#x2014; ACNS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-45239-0_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref27","article-title":"Simple Encrypted Arithmetic Library &#x2014; SEAL","author":"research","year":"0","journal-title":"2015"},{"key":"ref3","first-page":"44","article-title":"Practical techniques for searching on encrypted data","author":"song","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2011-0426"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-20465-4_9","article-title":"Implementing Gentry's Fully-Homomorphic Encryption Scheme","author":"gentry","year":"2011","journal-title":"Advances in Cryptology - EUROCRYPT 2011"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/11863908_29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_20"},{"key":"ref2","first-page":"169","article-title":"On Data Banks And Privacy Homomorphisms","author":"rivest","year":"1978","journal-title":"Foundations of Secure Computation"},{"journal-title":"The CryptDB project","year":"0","key":"ref9"},{"article-title":"A Fully Homomorphic Encryption Scheme","year":"2009","author":"gentry","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"ref21","first-page":"75","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","volume":"8042","author":"gentry","year":"2013","journal-title":"CRYPTO (1)"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"ref23","article-title":"FHE Bootstrapping in less than a second","author":"ducas","year":"2014","journal-title":"Cryptology-eprint-archive"},{"article-title":"FHEW &#x2014; A Fully Homomorphic Encryption library","year":"2014","author":"ducas","key":"ref26"},{"article-title":"HElib library","year":"2015","author":"halevi","key":"ref25"}],"event":{"name":"2016 International Conference on Communications (COMM)","start":{"date-parts":[[2016,6,9]]},"location":"Bucharest, Romania","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 International Conference on Communications (COMM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7522608\/7528195\/07528211.pdf?arnumber=7528211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T07:20:58Z","timestamp":1568272858000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7528211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/iccomm.2016.7528211","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}