{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,11]],"date-time":"2025-12-11T07:37:11Z","timestamp":1765438631353,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,2]],"date-time":"2019-12-02T00:00:00Z","timestamp":1575244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003382","name":"Core Research for Evolutional Science and Technology","doi-asserted-by":"publisher","award":["JPMJCR16E3"],"award-info":[{"award-number":["JPMJCR16E3"]}],"id":[{"id":"10.13039\/501100003382","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP19K11978"],"award-info":[{"award-number":["JP19K11978"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,2]]},"DOI":"10.1145\/3366030.3366081","type":"proceedings-article","created":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T12:18:47Z","timestamp":1582373927000},"page":"403-412","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Privacy-Preserving Similarity Search Scheme over Encrypted Word Embeddings"],"prefix":"10.1145","author":[{"given":"Daisuke","family":"Aritomo","sequence":"first","affiliation":[{"name":"Graduate School of Library, Information and Media Studies, University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Chiemi","family":"Watanabe","sequence":"additional","affiliation":[{"name":"Department of Industrial Information, Tsukuba University of Technology, Tsukuba, Ibaraki, Japan"}]},{"given":"Masaki","family":"Matsubara","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Atsuyuki","family":"Morishima","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]}],"member":"320","published-online":{"date-parts":[[2020,2,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884426"},{"key":"e_1_3_2_1_2_1","unstructured":"Tomas Mikolov Kai Chen Greg S. Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. (2013). http:\/\/arxiv.org\/abs\/1301.3781.  Tomas Mikolov Kai Chen Greg S. Corrado and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. (2013). http:\/\/arxiv.org\/abs\/1301.3781."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3269206.3269277"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180417"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1760749.1760788"},{"key":"e_1_3_2_1_6_1","volume-title":"Rafail Ostrovsky, and Giuseppe Persiano.","author":"Boneh Dan","year":"2004","unstructured":"Dan Boneh , Giovanni Di Crescenzo , Rafail Ostrovsky, and Giuseppe Persiano. 2004 . Public key encryption with keyword search. In Advances in Cryptology - EUROCRYPT 2004. Christian Cachin and Jan L. Camenisch, editors. Springer Berlin Heidelberg , Berlin, Heidelberg, 506--522. isbn: 978-3-540-24676-3. Dan Boneh, Giovanni Di Crescenzo, Rafail Ostrovsky, and Giuseppe Persiano. 2004. Public key encryption with keyword search. In Advances in Cryptology - EUROCRYPT 2004. Christian Cachin and Jan L. Camenisch, editors. Springer Berlin Heidelberg, Berlin, Heidelberg, 506--522. isbn: 978-3-540-24676-3."},{"key":"e_1_3_2_1_7_1","volume-title":"Advances in Cryptology - CRYPTO","author":"Cash David","year":"2013","unstructured":"David Cash , Stanislaw Jarecki , Charanjit Jutla , Hugo Krawczyk , Marcel-C\u0103t\u0103lin Ro\u015fu , and Michael Steiner . 2013. Highly-scalable searchable symmetric encryption with support for boolean queries . In Advances in Cryptology - CRYPTO 2013 . Ran Canetti and Juan A. Garay, editors. Springer Berlin Heidelberg , Berlin, Heidelberg, 353--373. isbn: 978-3-642-40041-4. David Cash, Stanislaw Jarecki, Charanjit Jutla, Hugo Krawczyk, Marcel-C\u0103t\u0103lin Ro\u015fu, and Michael Steiner. 2013. Highly-scalable searchable symmetric encryption with support for boolean queries. In Advances in Cryptology - CRYPTO 2013. Ran Canetti and Juan A. Garay, editors. Springer Berlin Heidelberg, Berlin, Heidelberg, 353--373. isbn: 978-3-642-40041-4."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.45"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2401003"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484322"},{"key":"e_1_3_2_1_11_1","volume-title":"E98.B, (January","author":"Fu Zhangjie","year":"2015","unstructured":"Zhangjie Fu , Sun Xingming , Qi Liu , Lu Zhou , and Jiangang Shu . 2015. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications , E98.B, (January 2015 ), 190--200. doi: 10.1587\/transcom.E98.B.190. 10.1587\/transcom.E98.B.190 Zhangjie Fu, Sun Xingming, Qi Liu, Lu Zhou, and Jiangang Shu. 2015. Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Transactions on Communications, E98.B, (January 2015), 190--200. doi: 10.1587\/transcom.E98.B.190."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2506573"},{"volume-title":"A privacy preserving similarity search scheme over encrypted high-dimensional data for multiple data owners","author":"Guo Cheng","key":"e_1_3_2_1_13_1","unstructured":"Cheng Guo , Pengxu Tian , and Xinyu Jie Yingmoand Tang . 2018. A privacy preserving similarity search scheme over encrypted high-dimensional data for multiple data owners . In Cloud Computing and Security. Xingming Sun, Zhaoqing Pan, and Elisa Bertino, editors. Springer International Publishing , Cham , 484--495. isbn: 978-3-030-00009-7. Cheng Guo, Pengxu Tian, and Xinyu Jie Yingmoand Tang. 2018. A privacy preserving similarity search scheme over encrypted high-dimensional data for multiple data owners. In Cloud Computing and Security. Xingming Sun, Zhaoqing Pan, and Elisa Bertino, editors. Springer International Publishing, Cham, 484--495. isbn: 978-3-030-00009-7."},{"key":"e_1_3_2_1_14_1","volume-title":"Multidimensional binary search trees used for associative searching. Commun. ACM, 18, 9, (September","author":"Bentley Jon Louis","year":"1975","unstructured":"Jon Louis Bentley . 1975. Multidimensional binary search trees used for associative searching. Commun. ACM, 18, 9, (September 1975 ), 509--517. issn: 0001-0782. doi: 10.1145\/361002.361007. http:\/\/doi.acm.org\/10.1145\/361002.361007. 10.1145\/361002.361007 Jon Louis Bentley. 1975. Multidimensional binary search trees used for associative searching. Commun. ACM, 18, 9, (September 1975), 509--517. issn: 0001-0782. doi: 10.1145\/361002.361007. http:\/\/doi.acm.org\/10.1145\/361002.361007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/602259.602266"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/93597.98741"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/313559.313789"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/829502.830043"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/509907.509965"},{"key":"e_1_3_2_1_20_1","unstructured":"[n. d.] Herumi\/mcl. (). https:\/\/github.com\/herumi\/mcl.  [n. d.] Herumi\/mcl. (). https:\/\/github.com\/herumi\/mcl."}],"event":{"name":"iiWAS2019: The 21st International Conference on Information Integration and Web-based Applications & Services","sponsor":["JKU Johannes Kepler Universit\u00e4t Linz","@WAS International Organization of Information Integration and Web-based Applications and Services"],"location":"Munich Germany","acronym":"iiWAS2019"},"container-title":["Proceedings of the 21st International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366081","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366030.3366081","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3366030.3366081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:50Z","timestamp":1750202630000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3366030.3366081"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,2]]},"references-count":20,"alternative-id":["10.1145\/3366030.3366081","10.1145\/3366030"],"URL":"https:\/\/doi.org\/10.1145\/3366030.3366081","relation":{},"subject":[],"published":{"date-parts":[[2019,12,2]]},"assertion":[{"value":"2020-02-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}