{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:34:30Z","timestamp":1750221270734,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"JSPS KAKENHI","award":["16K00149"],"award-info":[{"award-number":["16K00149"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3151759.3151786","type":"proceedings-article","created":{"date-parts":[[2018,2,9]],"date-time":"2018-02-09T18:54:36Z","timestamp":1518202476000},"page":"215-223","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An index-based secure query processing scheme for outsourced databases"],"prefix":"10.1145","author":[{"given":"Kento","family":"Akiyama","sequence":"first","affiliation":[{"name":"University of Tsukuba, Tsukuba, Japan"}]},{"given":"Chisato","family":"Shinozuka","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Japan"}]},{"given":"Chiemi","family":"Watanabe","sequence":"additional","affiliation":[{"name":"Advanced Institute of Industrial Technology, Shinagawa, Japan"}]},{"given":"Toshiyuki","family":"Amagasa","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Japan"}]},{"given":"Hiroyuki","family":"Kitagawa","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Japan"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007632"},{"volume-title":"10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5--9, 2004, Proceedings. 515--529","author":"Blake I. F.","key":"e_1_3_2_1_2_1","unstructured":"I. F. Blake and V. Kolesnikov . 2004. Strong Conditional Oblivious Transfer and Computing on Intervals. In Advances in Cryptology - ASIACRYPT 2004 , 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5--9, 2004, Proceedings. 515--529 . I. F. Blake and V. Kolesnikov. 2004. Strong Conditional Oblivious Transfer and Computing on Intervals. In Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5--9, 2004, Proceedings. 515--529."},{"key":"e_1_3_2_1_3_1","volume-title":"28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26--30, 2009. Proceedings. 224--241","author":"Boldyreva Alexandra","year":"2009","unstructured":"Alexandra Boldyreva , Nathan Chenette , Younho Lee , and Adam O'Neill . 2009 . Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009 , 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26--30, 2009. Proceedings. 224--241 . Alexandra Boldyreva, Nathan Chenette, Younho Lee, and Adam O'Neill. 2009. Order-Preserving Symmetric Encryption. In Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26--30, 2009. Proceedings. 224--241."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques","author":"Boneh D.","year":"2004","unstructured":"D. Boneh , G. D. Crescenzo , R. Ostrovsky , and G. Persiano . 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004 , International Conference on the Theory and Applications of Cryptographic Techniques , Interlaken, Switzerland, May 2--6 , 2004 , Proceedings. 506--522. D. Boneh, G. D. Crescenzo, R. Ostrovsky, and G. Persiano. 2004. Public Key Encryption with Keyword Search. In Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2--6, 2004, Proceedings. 506--522."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 33rd International Conference on VLDB","author":"Ge T.","year":"2007","unstructured":"T. Ge and S. B. Zdonik . 2007. Answering Aggregation Queries in a Secure System Model . In Proceedings of the 33rd International Conference on VLDB , University of Vienna, Austria, September 23--27 , 2007 . 519--530. http:\/\/www.vldb.org\/conf\/2007\/papers\/research\/p519-ge.pdf T. Ge and S. B. Zdonik. 2007. Answering Aggregation Queries in a Secure System Model. In Proceedings of the 33rd International Conference on VLDB, University of Vienna, Austria, September 23--27, 2007. 519--530. http:\/\/www.vldb.org\/conf\/2007\/papers\/research\/p519-ge.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564717"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"B. Hore S. Mehrotra and G. Tsudik. 2004. A Privacy-Preserving Index for Range Queries. In (e)Proceedings of the Thirtieth International Conference on VLDB Toronto Canada August 31 - September 3 2004. 720--731. http:\/\/www.vldb.org\/conf\/2004\/RS19P2.PDF   B. Hore S. Mehrotra and G. Tsudik. 2004. A Privacy-Preserving Index for Range Queries. In (e)Proceedings of the Thirtieth International Conference on VLDB Toronto Canada August 31 - September 3 2004. 720--731. http:\/\/www.vldb.org\/conf\/2004\/RS19P2.PDF","DOI":"10.1016\/B978-012088469-8.50064-4"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816687"},{"key":"e_1_3_2_1_11_1","volume-title":"MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values. IEICE Transactions 93-D, 9","author":"Kadhem Hasan","year":"2010","unstructured":"Hasan Kadhem , Toshiyuki Amagasa , and Hiroyuki Kitagawa . 2010. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values. IEICE Transactions 93-D, 9 ( 2010 ), 2520--2533. http:\/\/search.ieice.org\/bin\/summary.php?id=e93-d_9_2520 Hasan Kadhem, Toshiyuki Amagasa, and Hiroyuki Kitagawa. 2010. MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values. IEICE Transactions 93-D, 9 (2010), 2520--2533. http:\/\/search.ieice.org\/bin\/summary.php?id=e93-d_9_2520"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.23"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"S. Lee T. J. Park D. Lee T. Nam and S. Kim. 2009. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases. IEICE Transactions 92-D 11 (2009) 2207--2217. http:\/\/search.ieice.org\/bin\/summary.php?id=e92-d_11_2207  S. Lee T. J. Park D. Lee T. Nam and S. Kim. 2009. Chaotic Order Preserving Encryption for Efficient and Secure Queries on Databases. IEICE Transactions 92-D 11 (2009) 2207--2217. http:\/\/search.ieice.org\/bin\/summary.php?id=e92-d_11_2207","DOI":"10.1587\/transinf.E92.D.2207"},{"key":"e_1_3_2_1_14_1","unstructured":"E. Mykletun and G. Tsudik. 2006. Aggregation Queries in the Database-As-a-Service Model. In Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security Sophia Antipolis France July 31-August 2 2006 Proceedings. 89--103.  E. Mykletun and G. Tsudik. 2006. Aggregation Queries in the Database-As-a-Service Model. In Data and Applications Security XX 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security Sophia Antipolis France July 31-August 2 2006 Proceedings. 89--103."},{"key":"e_1_3_2_1_15_1","volume-title":"Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99","author":"Paillier P.","year":"1999","unstructured":"P. Paillier . 1999 . Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99 . 223--238. P. Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - EUROCRYPT '99. 223--238."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535573.2488336"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 32Nd International Conference on Very Large Data Bases (VLDB 06)","author":"Wang Hui","year":"1826","unstructured":"Hui Wang and Laks V. S. Lakshmanan . 2006. Efficient Secure Query Evaluation over Encrypted XML Databases . In Proceedings of the 32Nd International Conference on Very Large Data Bases (VLDB 06) . VLDB Endowment, 127--138. http:\/\/dl.acm.org\/citation.cfm?id=1 1826 35.1164140 Hui Wang and Laks V. S. Lakshmanan. 2006. Efficient Secure Query Evaluation over Encrypted XML Databases. In Proceedings of the 32Nd International Conference on Very Large Data Bases (VLDB 06). VLDB Endowment, 127--138. http:\/\/dl.acm.org\/citation.cfm?id=1182635.1164140"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544835"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588572"}],"event":{"name":"iiWAS2017: The 19th International Conference on Information Integration and Web-based Applications & Services","acronym":"iiWAS2017","location":"Salzburg Austria"},"container-title":["Proceedings of the 19th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3151759.3151786","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3151759.3151786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:05Z","timestamp":1750212665000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3151759.3151786"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":20,"alternative-id":["10.1145\/3151759.3151786","10.1145\/3151759"],"URL":"https:\/\/doi.org\/10.1145\/3151759.3151786","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}