{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:15:51Z","timestamp":1750306551466,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T00:00:00Z","timestamp":1444953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,10,16]]},"DOI":"10.1145\/2808425.2808431","type":"proceedings-article","created":{"date-parts":[[2015,10,6]],"date-time":"2015-10-06T14:29:08Z","timestamp":1444141748000},"page":"41-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Fast Order-Preserving Encryption from Uniform Distribution Sampling"],"prefix":"10.1145","author":[{"given":"Yong Ho","family":"Hwang","sequence":"first","affiliation":[{"name":"Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea"}]},{"given":"Sungwook","family":"Kim","sequence":"additional","affiliation":[{"name":"Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea"}]},{"given":"Jae Woo","family":"Seo","sequence":"additional","affiliation":[{"name":"Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2015,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"CryptDB texttthttp:\/\/css.csail.mit.edu\/cryptdb\/  CryptDB texttthttp:\/\/css.csail.mit.edu\/cryptdb\/"},{"key":"e_1_3_2_1_2_1","unstructured":"OpenMP texttthttp:\/\/openmp.org\/wp\/about-openmp\/  OpenMP texttthttp:\/\/openmp.org\/wp\/about-openmp\/"},{"key":"e_1_3_2_1_4_1","first-page":"14","volume-title":"O'Neill","author":"Amanatidis G.","year":"2007","unstructured":"Amanatidis , G. , Boldyreva , A. , O'Neill , A. : Provably-secure schemes for basic query support in outsourced satabases. In : Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007 . LNCS, vol. 4602 , pp. 14 -- 30 . Springer , Heidelberg (2007) Amanatidis, G., Boldyreva, A., O'Neill, A.: Provably-secure schemes for basic query support in outsourced satabases. In: Barker, S., Ahn, G.-J. (eds.) Data and Applications Security 2007. LNCS, vol. 4602, pp. 14--30. Springer, Heidelberg (2007)"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_6_1","first-page":"535","volume-title":"O'Neill","author":"Bellare M.","year":"2007","unstructured":"Bellare , M. , Boldyreva , A. , O'Neill , A. : Deterministic and efficiently searchable encryption. In : Menezes, A. (ed.) CRYPTO 2007 . LNCS, vol. 4622 , pp. 535 -- 552 . Springer , Heidelberg (2007) Bellare, M., Boldyreva, A., O'Neill, A.: Deterministic and efficiently searchable encryption. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 535--552. Springer, Heidelberg (2007)"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01001-9_13"},{"key":"e_1_3_2_1_8_1","first-page":"578","volume-title":"O'Neill","author":"Boldyreva A.","year":"2011","unstructured":"Boldyreva , A. , Chenette , N. , O'Neill , A. : Order-preserving encryption revisited: Improved security analysis and alternative solutions. In : Rogaway, P. (ed.) CRYPTO 2011 . LNCS, vol. 6841 , pp. 578 -- 595 . Springer , Heidelberg (2011) Boldyreva, A., Chenette, N., O'Neill, A.: Order-preserving encryption revisited: Improved security analysis and alternative solutions. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 578--595. Springer, Heidelberg (2011)"},{"key":"e_1_3_2_1_9_1","first-page":"506","volume-title":"Eurocrypt","author":"Boneh D.","year":"2004","unstructured":"Boneh D. , Di Crescenzo G. , Ostrovsky R. , Persiano G. : Public key encryption with keyword search . In: Cachin, C., Camenisch, J.L. (eds.) Eurocrypt 2004 . LNCS, vol. 3027 , pp. 506 -- 522 . Springer , Heidelberg (2004) Boneh D., Di Crescenzo G., Ostrovsky R., Persiano G.: Public key encryption with keyword search. In: Cachin, C., Camenisch, J.L. (eds.) Eurocrypt 2004. LNCS, vol.3027, pp. 506--522. Springer, Heidelberg (2004)"},{"key":"e_1_3_2_1_10_1","first-page":"111","volume-title":"Vahlis","author":"Benabbas S.","year":"2011","unstructured":"Benabbas , S. , Gennaro , R. , Vahlis , Y. : Verifiable delegation of computation over large datasets. In : Rogaway, P. (ed.) CRYPTO 2011 . LNCS, vol. 6841 , pp. 111 -- 131 . Springer , Heidelberg (2011) Benabbas, S., Gennaro, R., Vahlis, Y.: Verifiable delegation of computation over large datasets. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 111--131. Springer, Heidelberg (2011)"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_12_1","first-page":"50","volume-title":"Skeith III","author":"Boneh D.","year":"2007","unstructured":"Boneh , D. , Kushilevitz , E. , Ostrovsky , R. , Skeith III , W.E. : Public key encryption that allows PIR queries. In : Menezes, A. (ed.) CRYPTO 2007 . LNCS, vol. 4622 , pp. 50 -- 67 . Springer , Heidelberg (2007) Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public key encryption that allows PIR queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50--67. Springer, Heidelberg (2007)"},{"key":"e_1_3_2_1_13_1","volume-title":"Zimmerman","author":"Boneh D.","year":"2015","unstructured":"Boneh , D. , Lewi , K. , Raykova , M. , Sahai , A. , Zhandry , M. , Zimmerman , J. : Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation . In : EUROCRYPT 2015 . (to appear) Boneh, D., Lewi, K., Raykova, M., Sahai, A., Zhandry, M., Zimmerman, J.: Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation. In: EUROCRYPT 2015. (to appear)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11761679_25"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_3_2_1_16_1","first-page":"535","volume-title":"Waters","author":"Boneh D.","year":"2007","unstructured":"Boneh , D. , Waters , B. : Conjunctive, subset, and range queries on encrypted data. In : Vadhan, S.P. (ed.) TCC 2007 . LNCS, vol. 4392 , pp. 535 -- 554 . Springer , Heidelberg (2007) Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535--554. Springer, Heidelberg (2007)"},{"key":"e_1_3_2_1_17_1","volume-title":"Das","author":"Chatterjee S.","year":"2013","unstructured":"Chatterjee , S. , Das , M. P. L. : Property preserving symmetric encryption revisited. Cryptology ePrint Archive : Report 2013 \/830 (2013) Chatterjee, S., Das, M. P. L.: Property preserving symmetric encryption revisited. Cryptology ePrint Archive: Report 2013\/830 (2013)"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/293347.293350"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_2"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1137\/060651380"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_24_1","first-page":"364","volume-title":"Ostrovsky","author":"Kushilevitz E.","year":"1997","unstructured":"Kushilevitz , E. , Ostrovsky , R. : Replication is not needed: Single database, computationally-private information retrieval. In : FOCS. pp. 364 -- 373 ( 1997 ) Kushilevitz, E., Ostrovsky, R.: Replication is not needed: Single database, computationally-private information retrieval. In: FOCS. pp. 364--373 (1997)"},{"key":"e_1_3_2_1_25_1","first-page":"258","volume-title":"Papamanthou","author":"Kamara S.","year":"2013","unstructured":"Kamara , S. , Papamanthou , C. : Parallel and dynamic searchable symmetric encryption. In : Sadeghi, A.-R. (ed.) FC 2013 . LNCS, vol. 7859 , pp. 258 -- 274 . Springer , Heidelberg (2013) Kamara, S., Papamanthou, C.: Parallel and dynamic searchable symmetric encryption. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 258--274. Springer, Heidelberg (2013)"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382298"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/00949658508810839"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/50063.214387"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660277"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2014.2313863"},{"key":"e_1_3_2_1_31_1","volume-title":"19th Annual Network and Distributed System Security Symposium (NDSS Symposium12)","author":"Lu Y.","year":"2012","unstructured":"Lu , Y. : Privacy-preserving logarithmic-time search on encrypted data in cloud . In: 19th Annual Network and Distributed System Security Symposium (NDSS Symposium12) ( 2012 ) Lu, Y.: Privacy-preserving logarithmic-time search on encrypted data in cloud. In: 19th Annual Network and Distributed System Security Symposium (NDSS Symposium12) (2012)"},{"key":"e_1_3_2_1_32_1","volume-title":"Yung","author":"Malkin T.","year":"2013","unstructured":"Malkin , T. , Teranishi , I. , Yung , M. : Order-preserving encryption secure beyond one-wayness, Cryptology ePrint Archive : Report 2013 \/409 (2013) Malkin, T., Teranishi, I., Yung, M.: Order-preserving encryption secure beyond one-wayness, Cryptology ePrint Archive: Report 2013\/409 (2013)"},{"key":"e_1_3_2_1_33_1","first-page":"393","volume-title":"W.E.: A survey of single-database private information retrieval: Techniques and Applications","author":"Ostrovsky R.","year":"2007","unstructured":"Ostrovsky , R. , Skeith III , W.E.: A survey of single-database private information retrieval: Techniques and Applications . In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450 , pp. 393 -- 411 . Springer , Heidelberg ( 2007 ) Ostrovsky, R., Skeith III, W.E.: A survey of single-database private information retrieval: Techniques and Applications. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 393--411. Springer, Heidelberg (2007)"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_23"},{"key":"e_1_3_2_1_36_1","first-page":"541","volume-title":"Merkle tree traversal in log space and time","author":"Szydlo M.","year":"2004","unstructured":"Szydlo , M. : Merkle tree traversal in log space and time . In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027 , pp. 541 -- 554 . Springer , Heidelberg ( 2004 ) Szydlo, M.: Merkle tree traversal in log space and time. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 541--554. Springer, Heidelberg (2004)"},{"key":"e_1_3_2_1_37_1","first-page":"42","volume-title":"Malkin","author":"Teranishi I.","year":"2014","unstructured":"Teranishi , I. , Yung , M. , Malkin , T. : Order-preserving encryption secure beyond one-wayness. In : Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014 . LNCS, vol. 8874 , pp. 42 -- 61 . Springer , Heidelberg (2014) Teranishi, I., Yung, M., Malkin, T.: Order-preserving encryption secure beyond one-wayness. In: Sarkar, P., Iwata, T. (eds.) ASIACRYPT 2014. LNCS, vol. 8874, pp. 42--61. Springer, Heidelberg (2014)"}],"event":{"name":"CCS'15: The 22nd ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Denver Colorado USA","acronym":"CCS'15"},"container-title":["Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808425.2808431","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2808425.2808431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:41Z","timestamp":1750227161000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2808425.2808431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,16]]},"references-count":36,"alternative-id":["10.1145\/2808425.2808431","10.1145\/2808425"],"URL":"https:\/\/doi.org\/10.1145\/2808425.2808431","relation":{},"subject":[],"published":{"date-parts":[[2015,10,16]]},"assertion":[{"value":"2015-10-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}