{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T18:50:28Z","timestamp":1772736628050,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,6]],"date-time":"2017-11-06T00:00:00Z","timestamp":1509926400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,6]]},"DOI":"10.1145\/3131672.3131697","type":"proceedings-article","created":{"date-parts":[[2018,3,15]],"date-time":"2018-03-15T13:22:14Z","timestamp":1521120134000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Secure Sharing of Partially Homomorphic Encrypted IoT Data"],"prefix":"10.1145","author":[{"given":"Hossein","family":"Shafagh","sequence":"first","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]},{"given":"Anwar","family":"Hithnawi","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]},{"given":"Lukas","family":"Burkhalter","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]},{"given":"Pascal","family":"Fischli","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]},{"given":"Simon","family":"Duquennoy","sequence":"additional","affiliation":[{"name":"Inria Lille - Nord Europe, France and RISE SICS, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2017,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Diego F. Aranha and Conrado P.L. Gouv\u00eaa. 2017. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic. (2017).  Diego F. Aranha and Conrado P.L. Gouv\u00eaa. 2017. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic. (2017)."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Diego F. Aranha Koray Karabina Patrick Longa Catherine H. Gebotys and Julio Lopez. 2011. Faster Explicit Formulas for Computing Pairings over Ordinary Curves. In EUROCRYPT.   Diego F. Aranha Koray Karabina Patrick Longa Catherine H. Gebotys and Julio Lopez. 2011. Faster Explicit Formulas for Computing Pairings over Ordinary Curves. In EUROCRYPT.","DOI":"10.1007\/978-3-642-20465-4_5"},{"key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Giuseppe Ateniese Kevin Fu Matthew Green and Susan Hohenberger. 2005. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In NDSS.  Giuseppe Ateniese Kevin Fu Matthew Green and Susan Hohenberger. 2005. Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In NDSS.","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_1_5_1","unstructured":"Ava. 2016. Fertility Tracking Bracelet. Online: avawomen.com. (2016).  Ava. 2016. Fertility Tracking Bracelet. Online: avawomen.com. (2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989346"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_22"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Andrew Baumann Marcus Peinado and Galen Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven. In USENIX OSDI.   Andrew Baumann Marcus Peinado and Galen Hunt. 2014. Shielding Applications from an Untrusted Cloud with Haven. In USENIX OSDI.","DOI":"10.1145\/2799647"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Matt Blaze Gerrit Bleumer and Martin Strauss. 1998. Divertible Protocols and Atomic Proxy Cryptography. In EUROCRYPT.  Matt Blaze Gerrit Bleumer and Martin Strauss. 1998. Divertible Protocols and Atomic Proxy Cryptography. In EUROCRYPT.","DOI":"10.1007\/BFb0054122"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matthew K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO.   Dan Boneh and Matthew K. Franklin. 2001. Identity-Based Encryption from the Weil Pairing. In CRYPTO.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_7"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Dan Boneh Kevin Lewi Hart William Montgomery and Ananth Raghunathan. 2013. Key Homomorphic PRFs and Their Applications. In CRYPTO.  Dan Boneh Kevin Lewi Hart William Montgomery and Ananth Raghunathan. 2013. Key Homomorphic PRFs and Their Applications. In CRYPTO.","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1210\/jcem-8-7-544"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Cunsheng Ding Dingyi Pei and Arto Salomaa. 1996. Chinese remainder theorem: applications in computing coding cryptography. World Scientific.   Cunsheng Ding Dingyi Pei and Arto Salomaa. 1996. Chinese remainder theorem: applications in computing coding cryptography. World Scientific.","DOI":"10.1142\/3254"},{"key":"e_1_3_2_1_17_1","unstructured":"Stuart Dredge. 2013. Yes those Free Health Apps are Sharing your Data with other Companies. Guardian Online: theguardian.com\/technology\/appsblog\/2013\/sep\/03\/fitness-health-apps-sharing-data-insurance. (2013).  Stuart Dredge. 2013. Yes those Free Health Apps are Sharing your Data with other Companies. Guardian Online: theguardian.com\/technology\/appsblog\/2013\/sep\/03\/fitness-health-apps-sharing-data-insurance. (2013)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2004.38"},{"key":"e_1_3_2_1_19_1","unstructured":"Economist. 2015. Things are looking app. Online: economist.com\/news\/business\/21694523-mobile-health-apps-are-becoming-more-capable-and-potentially-rather-useful-things-are-looking. (2015).  Economist. 2015. Things are looking app. Online: economist.com\/news\/business\/21694523-mobile-health-apps-are-becoming-more-capable-and-potentially-rather-useful-things-are-looking. (2015)."},{"key":"e_1_3_2_1_20_1","unstructured":"Experian. 2015. Data Breach Industry Forecast. White Paper (2015).  Experian. 2015. Data Breach Industry Forecast. White Paper (2015)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9048-z"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Craig Gentry and Shai Halevi. 2011. Implementing Gentry's Fully-Homomorphic Encryption Scheme. In EUROCRYPT.   Craig Gentry and Shai Halevi. 2011. Implementing Gentry's Fully-Homomorphic Encryption Scheme. In EUROCRYPT.","DOI":"10.1007\/978-3-642-20465-4_9"},{"key":"e_1_3_2_1_24_1","unstructured":"Google. 2015. Encrypted Bigquery Client. Online: github.com\/google\/encrypted-bigquery-client. (2015).  Google. 2015. Encrypted Bigquery Client. Online: github.com\/google\/encrypted-bigquery-client. (2015)."},{"key":"e_1_3_2_1_25_1","unstructured":"Google. 2015. Google Sign-In. Online: developers.google.com\/identity\/sign-in\/android\/. (2015).  Google. 2015. Google Sign-In. Online: developers.google.com\/identity\/sign-in\/android\/. (2015)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660326"},{"key":"e_1_3_2_1_28_1","unstructured":"Yin Hu William J. Martin and Berk Sunar. 2012. Enhanced Flexibility for Homomorphic Encryption Schemes via CRT. In Applied Cryptography and Network Security (ACNS).  Yin Hu William J. Martin and Berk Sunar. 2012. Enhanced Flexibility for Homomorphic Encryption Schemes via CRT. In Applied Cryptography and Network Security (ACNS)."},{"key":"e_1_3_2_1_29_1","unstructured":"Mohammad Saiful Islam Mehmet Kuzu and Murat Kantarcioglu. 2012. Access Pattern Disclosure on Searchable Encryption: Ramification Attack and Mitigation. In NDSS.  Mohammad Saiful Islam Mehmet Kuzu and Murat Kantarcioglu. 2012. Access Pattern Disclosure on Searchable Encryption: Ramification Attack and Mitigation. In NDSS."},{"key":"e_1_3_2_1_30_1","unstructured":"Anca Ivan and Yevgeniy Dodis. 2003. Proxy Cryptography Revisited. In NDSS.  Anca Ivan and Yevgeniy Dodis. 2003. Proxy Cryptography Revisited. In NDSS."},{"key":"e_1_3_2_1_31_1","unstructured":"Stephanie Jernigan Sam Ransbotham and David Kiron. 2016. Data Sharing and Analytics Drive Success With IoT. MIT Sloan Management Review (September 2016).  Stephanie Jernigan Sam Ransbotham and David Kiron. 2016. Data Sharing and Analytics Drive Success With IoT. MIT Sloan Management Review (September 2016)."},{"key":"e_1_3_2_1_32_1","volume-title":"Verena: End-to-End Integrity Protection for Web Applications. In IEEE Symposium on Security and Privacy.","author":"Karapanos Nikolaos","year":"2016"},{"key":"e_1_3_2_1_33_1","unstructured":"Sriram Keelveedhi Mihir Bellare and Thomas Ristenpart. 2013. DupLESS: Server-Aided Encryption for Deduplicated Storage. In USENIX Security.   Sriram Keelveedhi Mihir Bellare and Thomas Ristenpart. 2013. DupLESS: Server-Aided Encryption for Deduplicated Storage. In USENIX Security."},{"key":"e_1_3_2_1_34_1","unstructured":"Keybase. 2016. Publicly Auditable Proofs of Identity. Online: keybase.io. (2016).  Keybase. 2016. Publicly Auditable Proofs of Identity. Online: keybase.io. (2016)."},{"key":"e_1_3_2_1_35_1","unstructured":"Torsten Lodderstedt Mark McGloin and Phil Hunt. 2013. OAuth 2.0 Threat Model and Security Considerations. IETF RFC 6819 (January 2013).  Torsten Lodderstedt Mark McGloin and Phil Hunt. 2013. OAuth 2.0 Threat Model and Security Considerations. IETF RFC 6819 (January 2013)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.17"},{"key":"e_1_3_2_1_38_1","unstructured":"Microsoft. 2015. Always Encrypted (Database Engine). Online: msdn.microsoft.com\/en-us\/library\/mt163865.aspx. (2015).  Microsoft. 2015. Always Encrypted (Database Engine). Online: msdn.microsoft.com\/en-us\/library\/mt163865.aspx. (2015)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0315-8"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813651"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Jakob Nielsen. 1993. Usability Engineering. Morgan Kaufmann Publ.   Jakob Nielsen. 1993. Usability Engineering. Morgan Kaufmann Publ.","DOI":"10.1016\/B978-0-08-052029-2.50009-7"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.30"},{"key":"e_1_3_2_1_43_1","unstructured":"Parmy Olson. 2014. For Google Fit Your Health Data Could Be Lucrative. Forbes Online: forbes.com\/sites\/parmyolson\/2014\/06\/26\/google-fit-health-data-lucrative. (2014).  Parmy Olson. 2014. For Google Fit Your Health Data Could Be Lucrative. Forbes Online: forbes.com\/sites\/parmyolson\/2014\/06\/26\/google-fit-health-data-lucrative. (2014)."},{"key":"e_1_3_2_1_44_1","unstructured":"Pascal Paillier. 1999. Public-key Cryptosystems Based on Composite Degree Residuosity Classes.. In EUROCRYPT.   Pascal Paillier. 1999. Public-key Cryptosystems Based on Composite Degree Residuosity Classes.. In EUROCRYPT."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2288131"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043566"},{"key":"e_1_3_2_1_47_1","unstructured":"Raluca Ada Popa Emily Stark Jonas Helfer Steven Valdez Nickolai Zeldovich M. Frans Kaashoek and Hari Balakrishnan. 2014. Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX NSDI.   Raluca Ada Popa Emily Stark Jonas Helfer Steven Valdez Nickolai Zeldovich M. Frans Kaashoek and Hari Balakrishnan. 2014. Building Web Applications on Top of Encrypted Data Using Mylar. In USENIX NSDI."},{"key":"e_1_3_2_1_48_1","volume-title":"Constants Count: Practical Improvements to Oblivious RAM. In USENIX Security.","author":"Ren Ling","year":"2015"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-43936-4_20"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2845157"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994551.2996536"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097620.3097625"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2809695.2809723"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787502"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.29"},{"key":"e_1_3_2_1_56_1","unstructured":"Elaine Shi Richard Chow T-H. Hubert Chan Dawn Song and Eleanor Rieffel. 2011. Privacy-preserving Aggregation of Time-series Data. In NDSS.  Elaine Shi Richard Chow T-H. Hubert Chan Dawn Song and Eleanor Rieffel. 2011. Privacy-preserving Aggregation of Time-series Data. In NDSS."},{"key":"e_1_3_2_1_57_1","unstructured":"Nigel Paul Smart. 2003. Cryptography: an Introduction. Vol. 5. McGraw-Hill New York.  Nigel Paul Smart. 2003. Cryptography: an Introduction. Vol. 5. McGraw-Hill New York."},{"key":"e_1_3_2_1_58_1","unstructured":"Dawn Xiaodong Song David Wagner and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In IEEE Security and Privacy.   Dawn Xiaodong Song David Wagner and Adrian Perrig. 2000. Practical Techniques for Searches on Encrypted Data. In IEEE Security and Privacy."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516660"},{"key":"e_1_3_2_1_60_1","unstructured":"Texas Instruments. 2013. CC2538 System-on-Chip for 2.4-GHz IEEE 802.15.4. Online: www.ti.com.cn\/cn\/lit\/ug\/swru319c\/swru319c.pdf. (2013).  Texas Instruments. 2013. CC2538 System-on-Chip for 2.4-GHz IEEE 802.15.4. Online: www.ti.com.cn\/cn\/lit\/ug\/swru319c\/swru319c.pdf. (2013)."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516666"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2034881"},{"key":"e_1_3_2_1_64_1","volume-title":"IEEE Conference on Communications and Network Security.","author":"Wang Boyang"},{"key":"e_1_3_2_1_65_1","volume-title":"Sieve: Cryptographically Enforced Access Control for User Data in Untrusted Clouds. In USENIX NSDI.","author":"Wang Frank","year":"2016"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"}],"event":{"name":"SenSys '17: The 15th ACM Conference on Embedded Network Sensor Systems","location":"Delft Netherlands","acronym":"SenSys '17","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems","SIGBED ACM Special Interest Group on Embedded Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 15th ACM Conference on Embedded Network Sensor Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131672.3131697","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3131672.3131697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:57Z","timestamp":1750212837000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3131672.3131697"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,6]]},"references-count":65,"alternative-id":["10.1145\/3131672.3131697","10.1145\/3131672"],"URL":"https:\/\/doi.org\/10.1145\/3131672.3131697","relation":{},"subject":[],"published":{"date-parts":[[2017,11,6]]},"assertion":[{"value":"2017-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}