{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:21:18Z","timestamp":1750306878778,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,12]],"date-time":"2013-06-12T00:00:00Z","timestamp":1370995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,12]]},"DOI":"10.1145\/2462410.2462418","type":"proceedings-article","created":{"date-parts":[[2013,6,5]],"date-time":"2013-06-05T12:10:07Z","timestamp":1370434207000},"page":"25-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Private data warehouse queries"],"prefix":"10.1145","author":[{"given":"Xun","family":"Yi","sequence":"first","affiliation":[{"name":"Victoria University, Melbourne, Australia"}]},{"given":"Russell","family":"Paulet","sequence":"additional","affiliation":[{"name":"Victoria University, Melbourne, Australia"}]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Guandong","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Technology, Sydney, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2013,6,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/646251.685989"},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. ECDPvA Workshop, Informatik'01","author":"Asonov D.","year":"2001","unstructured":"D. Asonov . Private information retrieval - an overview and current trends . In Proc. ECDPvA Workshop, Informatik'01 , 2001 . D. Asonov. Private information retrieval - an overview and current trends. In Proc. ECDPvA Workshop, Informatik'01, 2001."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/646254.684246"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756163"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_5"},{"key":"e_1_3_2_1_7_1","first-page":"304","volume-title":"Proc. 29th ACM Symposium on the Theory of Computing","author":"Chor B.","year":"1997","unstructured":"B. Chor and N. Gilboa . Computational private information retrieval . In Proc. 29th ACM Symposium on the Theory of Computing , pp. 304 - 313 , 1997 . B. Chor and N. Gilboa. Computational private information retrieval. In Proc. 29th ACM Symposium on the Theory of Computing, pp. 304-313, 1997."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_1_9_1","first-page":"119","volume-title":"Proc. PKC'01","author":"Damgard I.","year":"2001","unstructured":"I. Damgard and M. Jurik . A Generalisation, a simplification and some applications of Paillier's probabilistic public-key system . In Proc. PKC'01 , pages 119 - 136 , 2001 . I. Damgard and M. Jurik. A Generalisation, a simplification and some applications of Paillier's probabilistic public-key system. In Proc. PKC'01, pages 119-136, 2001."},{"key":"e_1_3_2_1_10_1","first-page":"24","volume-title":"Proc. EUROCRYPT'10","author":"Dijk M.","year":"2010","unstructured":"M. Dijk , C. Gentry , S. Halevi and V. Vaikuntanathan . Fully homomorphic encryption over the integers . In Proc. EUROCRYPT'10 , pages 24 - 43 , 2010 . M. Dijk, C. Gentry, S. Halevi and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In Proc. EUROCRYPT'10, pages 24-43, 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_65"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1145\/276698.276723","volume-title":"Proc. 30th ACM Symposium on Theory of Computing","author":"Gentner Y.","year":"1998","unstructured":"Y. Gentner , Y. Ishai , E. Kushilevitz and T. Malkin . Protecting data privacy in private information retrieval schemes . In Proc. 30th ACM Symposium on Theory of Computing , pp. 151 - 160 , 1998 . Y. Gentner, Y. Ishai, E. Kushilevitz and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. 30th ACM Symposium on Theory of Computing, pp. 151-160, 1998."},{"key":"e_1_3_2_1_15_1","first-page":"270","volume-title":"Journal of Computer and System Science, 28(2)","author":"Micali S.","year":"1984","unstructured":"S. Goldwasser S. and Micali ( 1984 ) Probabilistic encryption , Journal of Computer and System Science, 28(2) , pp. 270 - 299 . S. Goldwasser S. and Micali (1984) Probabilistic encryption, Journal of Computer and System Science, 28(2), pp. 270-299."},{"key":"e_1_3_2_1_16_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han J.","year":"2006","unstructured":"J. Han and M. Kamber , Data Mining: Concepts and Techniques . 2 nd Edition. Morgan Kaufmann Publishers , 2006 . J. Han and M. Kamber, Data Mining: Concepts and Techniques. 2nd Edition. Morgan Kaufmann Publishers, 2006.","edition":"2"},{"key":"e_1_3_2_1_17_1","volume-title":"Building the Data Warehouse","author":"Inmon W. H.","year":"1996","unstructured":"W. H. Inmon , Building the Data Warehouse . John Wiley & Sons , 1996 . W. H. Inmon, Building the Data Warehouse. John Wiley & Sons, 1996."},{"key":"e_1_3_2_1_18_1","first-page":"79","volume-title":"Proc. 31st ACM Symposium on the Theory of Computing","author":"Ishai Y.","year":"1999","unstructured":"Y. Ishai and E. Kushilevitz . Improved upper bounds on information theoretic private information retrieval . In Proc. 31st ACM Symposium on the Theory of Computing , pp. 79 - 88 , 1999 . Y. Ishai and E. Kushilevitz. Improved upper bounds on information theoretic private information retrieval. In Proc. 31st ACM Symposium on the Theory of Computing, pp. 79-88, 1999."},{"key":"e_1_3_2_1_19_1","first-page":"11","volume-title":"Efficient private information retrieval. IEICE Trans. Fund. Electron. Communi. Comput. Sci. E. 82-A(1)","author":"Itoh T.","year":"1999","unstructured":"T. Itoh . Efficient private information retrieval. IEICE Trans. Fund. Electron. Communi. Comput. Sci. E. 82-A(1) , pp. 11 - 20 , 1999 . T. Itoh. Efficient private information retrieval. IEICE Trans. Fund. Electron. Communi. Comput. Sci. E. 82-A(1), pp. 11-20, 1999."},{"key":"e_1_3_2_1_20_1","first-page":"157","volume-title":"On lower bounds for the communication complexity of private information retrieval. IEICE Trans. Fund. Electron. Communi. Comput. Sci. E. 84-A(1)","author":"Itoh T.","year":"2001","unstructured":"T. Itoh . On lower bounds for the communication complexity of private information retrieval. IEICE Trans. Fund. Electron. Communi. Comput. Sci. E. 84-A(1) , pp. 157 - 164 , 2001 . T. Itoh. On lower bounds for the communication complexity of private information retrieval. IEICE Trans. Fund. Electron. Communi. Comput. Sci. E. 84-A(1), pp. 157-164, 2001."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/795663.796363"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756182"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/11556992_23"},{"key":"e_1_3_2_1_24_1","first-page":"193","volume-title":"Proc. ICISC'09","author":"Lipmaa H.","year":"2009","unstructured":"H. Lipmaa . First CPIR protocol with data-dependent computation . In Proc. ICISC'09 , pages 193 - 210 , 2009 . H. Lipmaa. First CPIR protocol with data-dependent computation. In Proc. ICISC'09, pages 193-210, 2009."},{"key":"e_1_3_2_1_25_1","volume-title":"Handbook of Applied Cryptography","author":"Menezes A.","year":"1997","unstructured":"A. Menezes , P. van Oorchot and S. Vanstone , Handbook of Applied Cryptography . CRC Press , 1997 . A. Menezes, P. van Oorchot and S. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997."},{"key":"e_1_3_2_1_26_1","first-page":"225","volume-title":"Proc. INDOCRYPT'00","author":"Mishra S. K.","year":"2000","unstructured":"S. K. Mishra and P. Sarkar . Symmetrically private information retrieval . In Proc. INDOCRYPT'00 , pp. 225 - 236 , 2000 . S. K. Mishra and P. Sarkar. Symmetrically private information retrieval. In Proc. INDOCRYPT'00, pp. 225-236, 2000."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301312"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054135"},{"key":"e_1_3_2_1_29_1","first-page":"393","volume-title":"Proc. PKC'07","author":"Ostovsky R.","year":"2007","unstructured":"R. Ostovsky and W. E. Skeith III. A survey of single-database PIR: techniques and applications . In Proc. PKC'07 , pages 393 - 411 , 2007 . R. Ostovsky and W. E. Skeith III. A survey of single-database PIR: techniques and applications. In Proc. PKC'07, pages 393-411, 2007."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13013-7_25"}],"event":{"name":"SACMAT '13: 18th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Amsterdam The Netherlands","acronym":"SACMAT '13"},"container-title":["Proceedings of the 18th ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462410.2462418","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2462410.2462418","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:29Z","timestamp":1750234709000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2462410.2462418"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,12]]},"references-count":33,"alternative-id":["10.1145\/2462410.2462418","10.1145\/2462410"],"URL":"https:\/\/doi.org\/10.1145\/2462410.2462418","relation":{},"subject":[],"published":{"date-parts":[[2013,6,12]]},"assertion":[{"value":"2013-06-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}