{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:33Z","timestamp":1750306713632,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,9]],"date-time":"2014-09-09T00:00:00Z","timestamp":1410220800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,9]]},"DOI":"10.1145\/2659651.2659678","type":"proceedings-article","created":{"date-parts":[[2014,12,16]],"date-time":"2014-12-16T13:41:52Z","timestamp":1418737312000},"page":"211-216","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["An Order Preserving Encryption Scheme for Cloud Computing"],"prefix":"10.1145","author":[{"given":"Vikas","family":"Jaiman","sequence":"first","affiliation":[{"name":"CNRS-Verimag, Grenoble, France"}]},{"given":"Gaurav","family":"Somani","sequence":"additional","affiliation":[{"name":"Central University of Rajasthan, Ajmer, India"}]}],"member":"320","published-online":{"date-parts":[[2014,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A.\n       \n      Boldyreva N.\n       \n      Chenette and \n      \n      \n      A.\n       \n      O'Neill\n    .\n      \n  \n   \n  Order-preserving encryption revisited: Improved security analysis and alternative solutions. In P. Rogaway editor Advances in Cryptology -- CRYPTO\n   \n  2011 volume \n  6841\n   of \n  Lecture Notes in Computer Science pages \n  578\n  --\n  595\n  . \n  Springer Berlin Heidelberg 2011.   A. Boldyreva N. Chenette and A. O'Neill. Order-preserving encryption revisited: Improved security analysis and alternative solutions. In P. Rogaway editor Advances in Cryptology -- CRYPTO 2011 volume 6841 of Lecture Notes in Computer Science pages 578--595. Springer Berlin Heidelberg 2011.","DOI":"10.1007\/978-3-642-22792-9_33"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBIQUITOUS.2005.25"},{"key":"e_1_3_2_1_5_1","first-page":"251","volume-title":"Proceedings on Advances in cryptology---CRYPTO '86","author":"Benaloh J. Cohen","year":"1987"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"R. Cramer and I. Damgard. Zero-knowledge proofs for finite field arithmetic or: Can zero-knowledge be for free? 1998.  R. Cramer and I. Damgard. Zero-knowledge proofs for finite field arithmetic or: Can zero-knowledge be for free? 1998.","DOI":"10.7146\/brics.v4i27.18953"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2011.37"},{"key":"e_1_3_2_1_8_1","first-page":"10","volume-title":"Proceedings of CRYPTO 84 on Advances in cryptology","author":"Gamal T. El","year":"1985"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Y.\n       \n      Elovici R.\n       \n      Waisenberg E.\n       \n      Shmueli and \n      \n      \n      E.\n       \n      Gudes\n      \n  \n  . \n  A structure preserving database encryption scheme. In W. Jonker and M. Petkovi\u0107 editors Secure Data Management volume \n  3178\n   of \n  Lecture Notes in Computer Science pages \n  28\n  --\n  40\n  . \n  Springer Berlin Heidelberg 2004\n  .  Y. Elovici R. Waisenberg E. Shmueli and E. Gudes. A structure preserving database encryption scheme. In W. Jonker and M. Petkovi\u0107 editors Secure Data Management volume 3178 of Lecture Notes in Computer Science pages 28--40. Springer Berlin Heidelberg 2004.","DOI":"10.1007\/978-3-540-30073-1_3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"J.\n       \n      Garay B.\n       \n      Schoenmakers and \n      \n      \n      J.\n       \n      Villegas\n      \n  \n  . \n  Practical and secure solutions for integer comparison. In T. Okamoto and X. Wang editors Public Key Cryptography -- PKC\n   \n  2007 volume \n  4450\n   of \n  Lecture Notes in Computer Science pages \n  330\n  --\n  342\n  . \n  Springer Berlin Heidelberg 2007.   J. Garay B. Schoenmakers and J. Villegas. Practical and secure solutions for integer comparison. In T. Okamoto and X. Wang editors Public Key Cryptography -- PKC 2007 volume 4450 of Lecture Notes in Computer Science pages 330--342. Springer Berlin Heidelberg 2007.","DOI":"10.1007\/978-3-540-71677-8_22"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367913"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1873601.1873702"},{"volume-title":"DEIM Forum","year":"2010","author":"Kadhem H.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","first-page":"596","volume":"2011","author":"Kamara S.","year":"2011","journal-title":"Parallel homomorphic encryption. IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.65"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502000"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"P.\n       \n      Paillier\n    .\n      \n  \n   \n  Public-key cryptosystems based on composite degree residuosity classes. In J. Stern editor Advances in Cryptology-- EUROCRYPT'99 volume \n  1592\n   of \n  Lecture Notes in Computer Science pages \n  223\n  --\n  238\n  . \n  Springer Berlin Heidelberg 1999\n  .   P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern editor Advances in Cryptology-- EUROCRYPT'99 volume 1592 of Lecture Notes in Computer Science pages 223--238. Springer Berlin Heidelberg 1999.","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_20_1","first-page":"169","volume-title":"Foundations on Secure Computation","author":"Rivest R.","year":"1978"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCOS.2012.19"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1182635.1164140"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2012.6310814"}],"event":{"name":"SIN '14: The 7th International Conference on Security of Information and Networks","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","MNIT Malaviya National Institute of Technology","Aksaray Univ. Aksaray University","SICSA The Scottish Informatics and Computer Science Alliance","University of Glasgow University of Glasgow"],"location":"Glasgow Scotland UK","acronym":"SIN '14"},"container-title":["Proceedings of the 7th International Conference on Security of Information and Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2659651.2659678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:21Z","timestamp":1750231161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2659651.2659678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,9]]},"references-count":23,"alternative-id":["10.1145\/2659651.2659678","10.1145\/2659651"],"URL":"https:\/\/doi.org\/10.1145\/2659651.2659678","relation":{},"subject":[],"published":{"date-parts":[[2014,9,9]]},"assertion":[{"value":"2014-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}