{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:41Z","timestamp":1750306121803,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T00:00:00Z","timestamp":1494288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,9]]},"DOI":"10.1145\/3035918.3035948","type":"proceedings-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T18:09:00Z","timestamp":1494439740000},"page":"1069-1084","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Cryptanalysis of Comparable Encryption in SIGMOD'16"],"prefix":"10.1145","author":[{"given":"Caleb","family":"Horst","sequence":"first","affiliation":[{"name":"University of Washington Tacoma, Tacoma, WA, USA"}]},{"given":"Ryo","family":"Kikuchi","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Musashino-shi, Tokyo, Japan"}]},{"given":"Keita","family":"Xagawa","sequence":"additional","affiliation":[{"name":"NTT Secure Platform Laboratories, Musashino-shi, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"key":"e_1_3_2_1_2_1","first-page":"1","article-title":"A secure coprocessor for database applications","volume":"2013","author":"Arasu A.","year":"2013","unstructured":"A. Arasu , K. Eguro , R. Kaushik , D. Kossmann , R. Ramamurthy , and R. Venkatesan . A secure coprocessor for database applications . In FPL 2013 , pages 1 -- 8 , 2013 . A. Arasu, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. A secure coprocessor for database applications. In FPL 2013, pages 1--8, 2013.","journal-title":"FPL"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978379"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3088723.3088749"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033080"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_19"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_30"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-52993-5_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_20"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_12"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53008-5_21"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47989-6_13"},{"key":"e_1_3_2_1_17_1","unstructured":"O. Corporation. Transparent data encryption. http:\/\/www.oracle.com\/technetwork\/database\/options\/advanced-security\/index-099011.html.  O. Corporation. Transparent data encryption. http:\/\/www.oracle.com\/technetwork\/database\/options\/advanced-security\/index-099011.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40203-6_8"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-12280-9_22"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_20"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_32"},{"key":"e_1_3_2_1_23_1","unstructured":"Google. Encrypted BigQuery client. https:\/\/github.com\/google\/encrypted-bigquery-client.  Google. Encrypted BigQuery client. https:\/\/github.com\/google\/encrypted-bigquery-client."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/562056"},{"key":"e_1_3_2_1_25_1","first-page":"115","volume-title":"Sicherheit 2014","author":"Grofig P.","year":"2014","unstructured":"P. Grofig , M. H\u00e4rterich , I. Hang , F. Kerschbaum , M. Kohler , A. Schaad , A. Schr\u00f6pfer , and W. Tighzert . Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data . In Sicherheit 2014 , pages 115 -- 125 , 2014 . P. Grofig, M. H\u00e4rterich, I. Hang, F. Kerschbaum, M. Kohler, A. Schaad, A. Schr\u00f6pfer, and W. Tighzert. Experiences and observations on the industrial implementation of a system to search over outsourced encrypted data. In Sicherheit 2014, pages 115--125, 2014."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2749439"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_21"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882932"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813629"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.21564"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1137\/0214016"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978376"},{"key":"e_1_3_2_1_36_1","unstructured":"Microsoft. Always encrypted database engine. https:\/\/msdn.microsoft.com\/en-us\/library\/mt163865.aspx.  Microsoft. Always encrypted database engine. https:\/\/msdn.microsoft.com\/en-us\/library\/mt163865.aspx."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_38_1","first-page":"133","volume-title":"DBSec 2003","author":"\u00d6zsoyoglu G.","year":"2003","unstructured":"G. \u00d6zsoyoglu , D. A. Singer , and S. S. Chung . Anti-tamper databases: Querying encrypted databases . In DBSec 2003 , pages 133 -- 146 , 2003 . G. \u00d6zsoyoglu, D. A. Singer, and S. S. Chung. Anti-tamper databases: Querying encrypted databases. In DBSec 2003, pages 133--146, 2003."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.38"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45608-8_3"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1986.25"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_8"}],"event":{"name":"SIGMOD\/PODS'17: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"],"location":"Chicago Illinois USA","acronym":"SIGMOD\/PODS'17"},"container-title":["Proceedings of the 2017 ACM International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3035948","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3035918.3035948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:48Z","timestamp":1750217808000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3035948"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,9]]},"references-count":42,"alternative-id":["10.1145\/3035918.3035948","10.1145\/3035918"],"URL":"https:\/\/doi.org\/10.1145\/3035918.3035948","relation":{},"subject":[],"published":{"date-parts":[[2017,5,9]]},"assertion":[{"value":"2017-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}