{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:01Z","timestamp":1750306921654,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,30]],"date-time":"2012-10-30T00:00:00Z","timestamp":1351555200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2009CB320706"],"award-info":[{"award-number":["2009CB320706"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Hegaoji Major Project","award":["2009ZX01045-004-001-03"],"award-info":[{"award-number":["2009ZX01045-004-001-03"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,30]]},"DOI":"10.1145\/2430475.2430493","type":"proceedings-article","created":{"date-parts":[[2013,1,22]],"date-time":"2013-01-22T15:29:29Z","timestamp":1358868569000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting data confidentiality in cloud systems"],"prefix":"10.1145","author":[{"given":"Li","family":"Tao","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Ye","family":"Xiaojun","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Wang","family":"Jianmin","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2012,10,30]]},"reference":[{"volume-title":"GRACE International Symposium on Advanced Software Engineering 2010","year":"2010","author":"Mei Hong","key":"e_1_3_2_1_1_1"},{"issue":"10","key":"e_1_3_2_1_2_1","first-page":"546","volume":"2","author":"Atayero Aderemi A","year":"2011","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"key":"e_1_3_2_1_3_1","unstructured":"Craig Gentry Manipulating Data while It Is Encrypted; Lattice Crypto Day May 2010  Craig Gentry Manipulating Data while It Is Encrypted; Lattice Crypto Day May 2010"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_3_2_1_5_1","first-page":"169","volume-title":"Foundations of Secure Computation","author":"Rivest R.","year":"1987"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_7_1","first-page":"145","volume":"145","author":"Gentry C.","year":"2010","journal-title":"i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.; In Proceedings of IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_8_1","first-page":"299","volume":"270","author":"Goldwasser S.","year":"1984","journal-title":"Probabilistic Encryption.; In Proceedings of J. Comput. Syst. Sci."},{"key":"e_1_3_2_1_9_1","first-page":"234","volume":"219","author":"Rothblum R.","year":"2011","journal-title":"Proceedings of TCC"},{"key":"e_1_3_2_1_10_1","first-page":"66","volume":"51","author":"Howgrave-Graham N.","year":"2001","journal-title":"Proceedings of CaLC"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36594-2_32"},{"key":"e_1_3_2_1_12_1","first-page":"75","volume":"62","author":"Black J.","year":"2002","journal-title":"Encryption-Scheme Security in the Presence of Key-Dependent Messages.; In Proceedings of Selected Areas in Cryptography"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_30"},{"key":"e_1_3_2_1_14_1","unstructured":"H. Cohn and N. Heninger Approximate common divisors via lattices.; In Proceedings of CoRR. 2011.  H. Cohn and N. Heninger Approximate common divisors via lattices.; In Proceedings of CoRR. 2011."},{"key":"e_1_3_2_1_15_1","first-page":"131","volume":"112","author":"Goldreich O.","year":"1997","journal-title":"Public-Key Cryptosystems from Lattice Reduction Problems.; In Proceedings of CRYPTO"},{"key":"e_1_3_2_1_16_1","first-page":"524","volume":"505","author":"Brakerski Z.","year":"2011","journal-title":"FullyHomomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.; In Proceedings of CRYPTO"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"volume-title":"Stanford University","year":"2009","author":"Gentry C.","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","first-page":"111","volume":"111","author":"Brakerski Z.","year":"2011","journal-title":"Fully Homomorphic Encryption without Bootstrapping.; In Proceedings of Electronic Colloquium on Computational Complexity (ECCC)"},{"key":"e_1_3_2_1_20_1","first-page":"524","volume":"505","author":"Brakerski Z.","year":"2011","journal-title":"FullyHomomorphic Encryption from Ring-LWE and Security for Key Dependent Messages.; In Proceedings of CRYPTO"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_3_2_1_22_1","first-page":"137","volume":"116","author":"Gentry C.","year":"2010","journal-title":"Proceedings of CRYPTO"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.94"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.98"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"M. Brenner J. Wiebelitz G. v. Voigt and M. Smith Secret Program Execution in the Cloud Applying Homomorphic Encryption; 2011 Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference (DEST) pp. 114--119 2011.  M. Brenner J. Wiebelitz G. v. Voigt and M. Smith Secret Program Execution in the Cloud Applying Homomorphic Encryption; 2011 Proceedings of the 5th IEEE International Conference on Digital Ecosystems and Technologies Conference (DEST) pp. 114--119 2011.","DOI":"10.1109\/DEST.2011.5936608"},{"key":"e_1_3_2_1_27_1","first-page":"273","volume":"253","author":"Boneh D.","year":"2011","journal-title":"Functional Encryption: Definitions and Challenges.; In Proceedings of TCC"},{"key":"e_1_3_2_1_28_1","first-page":"148","volume":"129","author":"Gentry C.","year":"2011","journal-title":"Implementing Gentry's FullyHomomorphic Encryption Scheme.; In Proceedings of EUROCRYPT"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093506"}],"event":{"name":"Internetware '12: The Fourth Asia-Pacific Symposium on Internetware","sponsor":["NJU Nanjing University","Tsinghua University Tsinghua University","CCF China Computer Federation","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Qingdao China","acronym":"Internetware '12"},"container-title":["Proceedings of the Fourth Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2430475.2430493","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2430475.2430493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:35:22Z","timestamp":1750235722000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2430475.2430493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,30]]},"references-count":29,"alternative-id":["10.1145\/2430475.2430493","10.1145\/2430475"],"URL":"https:\/\/doi.org\/10.1145\/2430475.2430493","relation":{},"subject":[],"published":{"date-parts":[[2012,10,30]]},"assertion":[{"value":"2012-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}