{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:30:21Z","timestamp":1720114221162},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,5,1]],"date-time":"2017-05-01T00:00:00Z","timestamp":1493596800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636201","61572452","61502007","U1536108"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015M582015"],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1016\/j.ins.2016.12.025","type":"journal-article","created":{"date-parts":[[2016,12,15]],"date-time":"2016-12-15T09:04:45Z","timestamp":1481792685000},"page":"266-279","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":11,"special_numbering":"C","title":["Semi-order preserving encryption"],"prefix":"10.1016","volume":"387","author":[{"given":"Ce","family":"Yang","sequence":"first","affiliation":[]},{"given":"Weiming","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Nenghai","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ins.2016.12.025_bib0001","series-title":"Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, SIGMOD \u201904","first-page":"563","article-title":"Order preserving encryption for numeric data","author":"Agrawal","year":"2004"},{"key":"10.1016\/j.ins.2016.12.025_bib0002","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","article-title":"Security in cloud computing: opportunities and challenges","volume":"305","author":"Ali","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2016.12.025_bib0003","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2009, Vol. 5479 of Lecture Notes in Computer Science","first-page":"224","article-title":"Order-preserving symmetric encryption","author":"Boldyreva","year":"2009"},{"key":"10.1016\/j.ins.2016.12.025_bib0004","series-title":"Advances in Cryptology C CRYPTO 2011, Vol. 6841 of Lecture Notes in Computer Science","first-page":"578","article-title":"Order-preserving encryption revisited: improved security analysis and alternative solutions","author":"Boldyreva","year":"2011"},{"key":"10.1016\/j.ins.2016.12.025_bib0005","series-title":"Advances in Cryptology \u2013 EUROCRYPT 2004, Vol. 3027 of Lecture Notes in Computer Science","first-page":"506","article-title":"Public key encryption with keyword search","author":"Boneh","year":"2004"},{"key":"10.1016\/j.ins.2016.12.025_bib0006","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.ins.2015.06.015","article-title":"The \u03c3-neighborhood skyline queries","volume":"322","author":"Chen","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2016.12.025_sbref0007","series-title":"Tech. rep.","article-title":"Bucket ORAM: single online roundtrip, constant bandwidth oblivious RAM","author":"Fletcher","year":"2015"},{"issue":"9","key":"10.1016\/j.ins.2016.12.025_bib0008","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","article-title":"Enabling personalized search over encrypted outsourced data with efficiency improvement","volume":"27","author":"Fu","year":"2016","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.ins.2016.12.025_bib0009","series-title":"Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 09","first-page":"169","article-title":"Fully homomorphic encryption using ideal lattices","author":"Gentry","year":"2009"},{"key":"10.1016\/j.ins.2016.12.025_bib0010","unstructured":"E.-J. Goh, 2003, Secure indexes, Cryptology ePrint Archive, Report 2003\/216, http:\/\/eprint.iacr.org\/2003\/216\/."},{"key":"10.1016\/j.ins.2016.12.025_bib0011","unstructured":"2015, Google, The encrypted bigquery client, https:\/\/github.com\/google\/encrypted-bigquery-client."},{"key":"10.1016\/j.ins.2016.12.025_bib0012","series-title":"Computer Science and Information Systems (FedCSIS), 2014 Federated Conference on","first-page":"891","article-title":"Order-preserving encryption schemes based on arithmetic coding and matrices","volume":"vol. 480","author":"Krendelev","year":"2014"},{"issue":"9","key":"10.1016\/j.ins.2016.12.025_bib0013","doi-asserted-by":"crossref","first-page":"1918","DOI":"10.1109\/TIFS.2015.2435697","article-title":"Security analysis on one-to-many order preserving encryption-based cloud data search","volume":"10","author":"Li","year":"2015","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"5","key":"10.1016\/j.ins.2016.12.025_bib0014","doi-asserted-by":"crossref","first-page":"2085","DOI":"10.12785\/amis\/080501","article-title":"Securing databases by using diagonal-based order preserving symmetric encryption","volume":"8","author":"Mart\u0131nez","year":"2014","journal-title":"Appl. Math. Inf. Sci."},{"key":"10.1016\/j.ins.2016.12.025_bib0015","series-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 15","first-page":"644","article-title":"Inference attacks on property-preserving encrypted databases","author":"Naveed","year":"2015"},{"key":"10.1016\/j.ins.2016.12.025_bib0016","series-title":"Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles, SOSP 11","first-page":"85","article-title":"Cryptdb: protecting confidentiality with encrypted query processing","author":"Popa","year":"2011"},{"key":"10.1016\/j.ins.2016.12.025_bib0017","series-title":"Security and Privacy (SP), 2013 IEEE Symposium on","first-page":"463","article-title":"An ideal-security protocol for order-preserving encoding","volume":"vol. 465","author":"Popa","year":"2013"},{"key":"10.1016\/j.ins.2016.12.025_bib0018","series-title":"Security and Privacy, 2000. S&P 2000. Proceedings. 2000 IEEE Symposium on","first-page":"44","article-title":"Practical techniques for searches on encrypted data","author":"Song","year":"2000"},{"issue":"1","key":"10.1016\/j.ins.2016.12.025_bib0019","doi-asserted-by":"crossref","first-page":"13:1","DOI":"10.1145\/2906153","article-title":"Ensuring security and privacy preservation for cloud data services","volume":"49","author":"Tang","year":"2016","journal-title":"ACM Comput. Surv."},{"issue":"8","key":"10.1016\/j.ins.2016.12.025_bib0020","doi-asserted-by":"crossref","first-page":"1467","DOI":"10.1109\/TPDS.2011.282","article-title":"Enabling secure and efficient ranked keyword search over outsourced cloud data","volume":"23","author":"Wang","year":"2012","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.ins.2016.12.025_bib0021","series-title":"Proceedings of the 2013\u00a0 ACM Workshop on Cloud Computing Security Workshop, CCSW 13","first-page":"89","article-title":"Beyond the ideal object: towards disclosure-resilient order-preserving encryption schemes","author":"Wozniak","year":"2013"},{"key":"10.1016\/j.ins.2016.12.025_bib0022","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.ins.2015.07.010","article-title":"Constructing plausible innocuous pseudo queries to protect user query intention","volume":"325","author":"Wu","year":"2015","journal-title":"Inf. Sci."},{"issue":"2","key":"10.1016\/j.ins.2016.12.025_bib0023","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","article-title":"A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data","volume":"27","author":"Xia","year":"2016","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.ins.2016.12.025_bib0024","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/j.ins.2016.02.018","article-title":"Processing secure, verifiable and efficient SQL over outsourced database","volume":"348","author":"Xiang","year":"2016","journal-title":"Inf. Sci."},{"key":"10.1016\/j.ins.2016.12.025_bib0025","series-title":"Information Sciences and Systems (CISS), 2012 46th Annual Conference on","first-page":"1","article-title":"Security analysis for order preserving encryption schemes","author":"Xiao","year":"2012"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025516320503?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025516320503?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T00:55:27Z","timestamp":1536195327000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025516320503"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":25,"alternative-id":["S0020025516320503"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2016.12.025","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2017,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Semi-order preserving encryption","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2016.12.025","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2016 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}