{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T21:06:36Z","timestamp":1740171996958,"version":"3.37.3"},"reference-count":39,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T00:00:00Z","timestamp":1648771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Cloud Comput."],"published-print":{"date-parts":[[2022,4,1]]},"DOI":"10.1109\/tcc.2020.2969655","type":"journal-article","created":{"date-parts":[[2020,1,28]],"date-time":"2020-01-28T22:50:31Z","timestamp":1580251831000},"page":"1373-1385","source":"Crossref","is-referenced-by-count":6,"title":["FPGA-Accelerated Searchable Encrypted Database Management Systems for Cloud Services"],"prefix":"10.1109","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8869-0760","authenticated-orcid":false,"given":"Mitsuhiro","family":"Okada","sequence":"first","affiliation":[{"name":"Research and Development Group, Center for Technology Innovation - Digital Technology, Hitachi, Japan"}]},{"given":"Takayuki","family":"Suzuki","sequence":"additional","affiliation":[{"name":"Financial Institutions Business Unit, Hitachi, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6209-0190","authenticated-orcid":false,"given":"Naoya","family":"Nishio","sequence":"additional","affiliation":[{"name":"Research and Development Group, Center for Technology Innovation - Digital Technology, Hitachi, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5108-9891","authenticated-orcid":false,"given":"Hasitha Muthumala","family":"Waidyasooriya","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]},{"given":"Masanori","family":"Hariyama","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Japan"}]}],"member":"263","reference":[{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"article-title":"Orthogonal security with cipherbase","volume-title":"Proc. 6th Biennial Conf. Innovative Data Syst. Res.","author":"Arasu","key":"ref7"},{"key":"ref8","first-page":"370","article-title":"StealthDB: A scalable encrypted database with full SQL query support","volume":"2019","author":"Gribov","year":"2017","journal-title":"Proc. Privacy Enhancing Technol."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61176-1_22"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66787-4_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"ref12","first-page":"587","article-title":"Big data analytics over encrypted datasets with seabed","volume-title":"Proc. 12th USENIX Symp. Operating Syst. Des. Implementation","author":"Papadimitriou"},{"author":"Poddar","key":"ref13","article-title":"Arx: A strongly encrypted database system"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2012.18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2013.6641403"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2013.17"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2015.7393148"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57972-6_10"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.12783\/dtcse\/ameit2017\/12328"},{"key":"ref25","first-page":"74","article-title":"Accelerate the paillier cryptosystem in CryptDB by chinese remainder theorem","volume-title":"Proc. Int. Conf. Adv. Commun. Technol.","author":"Liu"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848445"},{"article-title":"Secure indexes","volume-title":"Proc. IDIMACS Workshop Privacy Preserving Data-Mining","author":"Goh","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/NBiS.2011.110"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23264"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_24"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_15"},{"author":"Wu","key":"ref36","article-title":"An implementation of order-revealing encryption"},{"key":"ref37","first-page":"123","article-title":"Rich queries on encrypted data: Beyond exact matches","volume-title":"Proc. Eur. Symp. Res. Comput. Secur.","author":"Sky"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2015-0014"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3201595.3201598"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183754"},{"article-title":"MDS matrices with lightweight circuits","author":"Duval","key":"ref46","doi-asserted-by":"crossref","DOI":"10.46586\/tosc.v2018.i2.48-78"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3126558"},{"key":"ref51","first-page":"1622","article-title":"Securing the cloud with reconfigurable computing: An FPGA accelerator for homomorphic encryption","volume-title":"Proc. Des. Autom. Test Europe Conf. Exhib.","author":"Cilardo"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/BIGCOMP.2017.7881734"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2016.7577329"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.04.018"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750412"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.14778\/2732967.2732972"}],"container-title":["IEEE Transactions on Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6245519\/9789509\/08972578.pdf?arnumber=8972578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:40:41Z","timestamp":1704840041000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8972578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,1]]},"references-count":39,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tcc.2020.2969655","relation":{},"ISSN":["2168-7161","2372-0018"],"issn-type":[{"type":"electronic","value":"2168-7161"},{"type":"electronic","value":"2372-0018"}],"subject":[],"published":{"date-parts":[[2022,4,1]]}}}