{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:12:15Z","timestamp":1729678335061,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/smartcomp.2017.7947038","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:36:09Z","timestamp":1497566169000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Private Substring Search on Homomorphically Encrypted Data"],"prefix":"10.1109","author":[{"given":"Yu","family":"Ishimaki","sequence":"first","affiliation":[]},{"given":"Hiroki","family":"Imabayashi","sequence":"additional","affiliation":[]},{"given":"Hayato","family":"Yamana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"868","DOI":"10.1007\/978-3-642-32009-5_50","article-title":"Fully homomorphic encryption without modulus switching from classical gapsvp","volume":"7417","author":"brakerski","year":"2012","journal-title":"Advances in Cryptology CRYPTO 2012"},{"key":"ref12","first-page":"75","article-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","volume":"8042","author":"gentry","year":"2013","journal-title":"Advances in Cryptology"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1007\/978-3-662-46800-5_25","article-title":"Bootstrapping for helib","volume":"9056","author":"halevi","year":"2015","journal-title":"Advances in Cryptology &#x2013; EUROCRYPT 2015"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-642-13190-5_1","article-title":"On ideal lattices and learning with errors over rings","volume":"6110","author":"lyubashevsky","year":"2010","journal-title":"Advances in Cryptology - Eurocrypt 2010"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1007\/978-3-662-44371-2_31","article-title":"Algorithms in helib","volume":"8616","author":"halevi","year":"2014","journal-title":"Advances in Cryptology &#x2014; CRYPTO 2014 Proceedings Part I"},{"key":"ref17","article-title":"How to exchange secrets with oblivious transfer","author":"rabin","year":"0","journal-title":"Cryptology ePrint archive report 2005"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1007\/978-3-319-22174-8_4","article-title":"Depth optimized efficient homomorphic sorting","volume":"9230","author":"\u00e7etin","year":"2015","journal-title":"Progress in Cryptology-LATINCRYPT 2015"},{"key":"ref4","article-title":"Access pattern disclosure on searchable encryption: Ramification, attack and mitigation","volume":"12","author":"islam","year":"2012","journal-title":"Proc of NDSS&#x2019;"},{"key":"ref3","article-title":"Storage efficient substring searchable symmetric encryption","author":"leontiadis","year":"2017","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btw050"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813700"},{"key":"ref8","article-title":"A block-sorting lossless data compression algorithm","author":"burrows","year":"1994","journal-title":"Tech Rep"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1007\/978-3-642-32009-5_49","article-title":"Homomorphic evaluation of the aes circuit","volume":"7417","author":"gentry","year":"2012","journal-title":"Advances in Cryptology CRYPTO 2012"},{"key":"ref2","article-title":"Substring-searchable symmetric encryption","author":"chase","year":"2014","journal-title":"Cryptology ePrint Archive Report"},{"key":"ref1","first-page":"136","article-title":"Cryptographic cloud storage","volume":"6054","author":"kamara","year":"2010","journal-title":"Financial Cryptography and Data Security FC 2010 Workshops RLCPS WECSR and WLC 2010"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"}],"event":{"name":"2017 IEEE International Conference on Smart Computing (SMARTCOMP)","start":{"date-parts":[[2017,5,29]]},"location":"Hong Kong, China","end":{"date-parts":[[2017,5,31]]}},"container-title":["2017 IEEE International Conference on Smart Computing (SMARTCOMP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7943263\/7946954\/07947038.pdf?arnumber=7947038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T04:31:15Z","timestamp":1569472275000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7947038\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/smartcomp.2017.7947038","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}