{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:24Z","timestamp":1772039484038,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T00:00:00Z","timestamp":1649894400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["826093"],"award-info":[{"award-number":["826093"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,14]]},"DOI":"10.1145\/3508398.3511514","type":"proceedings-article","created":{"date-parts":[[2022,4,16]],"date-time":"2022-04-16T04:13:31Z","timestamp":1650082411000},"page":"300-311","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Private Lives Matter"],"prefix":"10.1145","author":[{"given":"Alexandros","family":"Bakas","sequence":"first","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Antonis","family":"Michalas","sequence":"additional","affiliation":[{"name":"Tampere University, Tampere, Finland"}]},{"given":"Tassos","family":"Dimitriou","sequence":"additional","affiliation":[{"name":"Kuwait University, Kuwait City, Kuwait"}]}],"member":"320","published-online":{"date-parts":[[2022,4,15]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n.d.]. Apple. https:\/\/support.apple.com\/en-us\/HT211808.  [n.d.]. Apple. https:\/\/support.apple.com\/en-us\/HT211808."},{"key":"e_1_3_2_2_2_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Abdalla Michel","year":"2018","unstructured":"Michel Abdalla , Dario , Dario Fiore , Romain Gay , and Bogdan Ursu . 2018. MultiInput Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings . In Advances in Cryptology -- CRYPTO 2018 . Michel Abdalla, Dario , Dario Fiore, Romain Gay, and Bogdan Ursu. 2018. MultiInput Functional Encryption for Inner Products: Function-Hiding Realizations and Constructions Without Pairings. In Advances in Cryptology -- CRYPTO 2018."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_33"},{"key":"e_1_3_2_2_4_1","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer.","author":"Abdalla Michel","unstructured":"Michel Abdalla , Romain Gay , Mariana Raykova , and Hoeteck Wee . [n.d.]. Multiinput inner-product functional encryption from pairings . In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer. Michel Abdalla, Romain Gay, Mariana Raykova, and Hoeteck Wee. [n.d.]. Multiinput inner-product functional encryption from pairings. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0042"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00146"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC50000.2020.9219739"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81242-3_5"},{"key":"e_1_3_2_2_10_1","volume-title":"Nordic Conference on Secure IT Systems. Springer, 111--126","author":"Bakas Alexandros","year":"2020","unstructured":"Alexandros Bakas , Antonis Michalas , and Amjad Ullah . 2020 . (f) unctional sifting: A privacy-preserving reputation system through multi-input functional encryption . In Nordic Conference on Secure IT Systems. Springer, 111--126 . Alexandros Bakas, Antonis Michalas, and Amjad Ullah. 2020. (f) unctional sifting: A privacy-preserving reputation system through multi-input functional encryption. In Nordic Conference on Secure IT Systems. Springer, 111--126."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2450142.2450148"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19571-6_16"},{"key":"e_1_3_2_2_13_1","volume-title":"2011 IEEE symposium on security and privacy. 231--246","author":"Calandrino Joseph A","unstructured":"Joseph A Calandrino , Ann Kilzer , Arvind Narayanan , Edward W Felten , and Vitaly Shmatikov . [n.d.]. \" You might also like:\" Privacy risks of collaborative filtering . In 2011 IEEE symposium on security and privacy. 231--246 . Joseph A Calandrino, Ann Kilzer, Arvind Narayanan, Edward W Felten, and Vitaly Shmatikov. [n.d.]. \" You might also like:\" Privacy risks of collaborative filtering. In 2011 IEEE symposium on security and privacy. 231--246."},{"key":"e_1_3_2_2_14_1","article-title":"Private and Continual Release of Statistics","volume":"14","author":"Hubert Chan T.-H.","year":"2011","unstructured":"T.-H. Hubert Chan , Elaine Shi , and Dawn Song . 2011 . Private and Continual Release of Statistics . ACM Trans. Inf. Syst. Secur. 14 , 3, Article 26 (Nov. 2011). T.-H. Hubert Chan, Elaine Shi, and Dawn Song. 2011. Private and Continual Release of Statistics. ACM Trans. Inf. Syst. Secur. 14, 3, Article 26 (Nov. 2011).","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2013.04.013"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773173"},{"key":"e_1_3_2_2_17_1","volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265--284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265--284."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806689.1806787"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0015"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_32"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_30"},{"key":"e_1_3_2_2_23_1","volume-title":"Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis. BMJ 364","author":"Grundy Quinn","year":"2019","unstructured":"Quinn Grundy , Kellia Chiu , Fabian Held , Andrea Continella , Lisa Bero , and Ralph Holz . 2019. Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis. BMJ 364 ( 2019 ). https:\/\/doi. org\/10.1136\/bmj.l920 arXiv:https:\/\/www.bmj.com\/content\/364\/bmj.l920.full.pdf Quinn Grundy, Kellia Chiu, Fabian Held, Andrea Continella, Lisa Bero, and Ralph Holz. 2019. Data sharing practices of medicines related apps and the mobile ecosystem: traffic, content, and network analysis. BMJ 364 (2019). https:\/\/doi. org\/10.1136\/bmj.l920 arXiv:https:\/\/www.bmj.com\/content\/364\/bmj.l920.full.pdf"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3187009.3177733"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_12"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"crossref","unstructured":"Georgios Kellaris Stavros Papadopoulos Xiaokui Xiao and Dimitris Papadias. 2014. Differentially private event sequences over infinite streams. (2014).  Georgios Kellaris Stavros Papadopoulos Xiaokui Xiao and Dimitris Papadias. 2014. Differentially private event sequences over infinite streams. (2014).","DOI":"10.14778\/2732977.2732989"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_2_2_28_1","volume-title":"48th Annual IEEE Symposium on Foundations of Computer Science.","author":"McSherry Frank","unstructured":"Frank McSherry and Kunal Talwar . [n.d.]. Mechanism design via differential privacy . In 48th Annual IEEE Symposium on Foundations of Computer Science. Frank McSherry and Kunal Talwar. [n.d.]. Mechanism design via differential privacy. In 48th Annual IEEE Symposium on Foundations of Computer Science."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756146"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380596"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866359"},{"key":"e_1_3_2_2_34_1","first-page":"206","article-title":"Reading in the Dark: Classifying Encrypted Digits with Functional Encryption","volume":"2018","author":"Sans Edouard Dufour","year":"2018","unstructured":"Edouard Dufour Sans , Romain Gay , and David Pointcheval . 2018 . Reading in the Dark: Classifying Encrypted Digits with Functional Encryption . IACR Cryptology ePrint Archive 2018 (2018), 206 . Edouard Dufour Sans, Romain Gay, and David Pointcheval. 2018. Reading in the Dark: Classifying Encrypted Digits with Functional Encryption. IACR Cryptology ePrint Archive 2018 (2018), 206.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48000-7_33"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.135"}],"event":{"name":"CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy","location":"Baltimore MD USA","acronym":"CODASPY '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511514","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3508398.3511514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:39Z","timestamp":1750188639000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3508398.3511514"}},"subtitle":["A Differential Private Functional Encryption Scheme"],"short-title":[],"issued":{"date-parts":[[2022,4,14]]},"references-count":34,"alternative-id":["10.1145\/3508398.3511514","10.1145\/3508398"],"URL":"https:\/\/doi.org\/10.1145\/3508398.3511514","relation":{},"subject":[],"published":{"date-parts":[[2022,4,14]]},"assertion":[{"value":"2022-04-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}