{"id":"https://openalex.org/W4391913732","doi":"https://doi.org/10.1049/2024/6052651","title":"Low Communication\u2010Cost PSI Protocol for Unbalanced Two\u2010Party Private Sets","display_name":"Low Communication\u2010Cost PSI Protocol for Unbalanced Two\u2010Party Private Sets","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4391913732","doi":"https://doi.org/10.1049/2024/6052651"},"language":"en","primary_location":{"id":"doi:10.1049/2024/6052651","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2024/6052651","pdf_url":"https://downloads.hindawi.com/journals/ietis/2024/6052651.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://downloads.hindawi.com/journals/ietis/2024/6052651.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017169328","display_name":"Jingyu Ning","orcid":"https://orcid.org/0000-0002-6949-6636"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingyu Ning","raw_affiliation_strings":["Software College, Northeastern University, Shenyang 110819","Software College, Northeastern University, Shenyang 110819, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009338378","display_name":"Zhenhua Tan","orcid":"https://orcid.org/0000-0002-9870-8925"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhenhua Tan","raw_affiliation_strings":["Software College, Northeastern University, Shenyang 110819","Software College, Northeastern University, Shenyang 110819, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069342234","display_name":"K Zhang","orcid":"https://orcid.org/0009-0007-2760-3273"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaibing Zhang","raw_affiliation_strings":["Software College, Northeastern University, Shenyang 110819","Software College, Northeastern University, Shenyang 110819, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065830402","display_name":"Weizhong Ye","orcid":"https://orcid.org/0009-0003-8004-4563"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhong Ye","raw_affiliation_strings":["Software College, Northeastern University, Shenyang 110819","Software College, Northeastern University, Shenyang 110819, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819","institution_ids":["https://openalex.org/I9224756"]},{"raw_affiliation_string":"Software College, Northeastern University, Shenyang 110819, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009338378"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":{"value":2000,"currency":"EUR","value_usd":2200},"apc_paid":{"value":2000,"currency":"EUR","value_usd":2200},"fwci":1.4287,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.83176198,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"2024","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.8765138983726501},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8353204131126404},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7457147836685181},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5694587230682373},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5496101379394531},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5295529961585999},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5113098621368408},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5090662837028503},{"id":"https://openalex.org/keywords/encoding","display_name":"Encoding (memory)","score":0.48893871903419495},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.48227885365486145},{"id":"https://openalex.org/keywords/perfect-hash-function","display_name":"Perfect hash function","score":0.4443078637123108},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.42025917768478394},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.40504512190818787},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.33757346868515015},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2240464985370636}],"concepts":[{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.8765138983726501},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8353204131126404},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7457147836685181},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5694587230682373},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5496101379394531},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5295529961585999},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5113098621368408},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5090662837028503},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.48893871903419495},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.48227885365486145},{"id":"https://openalex.org/C87431388","wikidata":"https://www.wikidata.org/wiki/Q2070573","display_name":"Perfect hash function","level":4,"score":0.4443078637123108},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.42025917768478394},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.40504512190818787},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.33757346868515015},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2240464985370636},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1049/2024/6052651","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2024/6052651","pdf_url":"https://downloads.hindawi.com/journals/ietis/2024/6052651.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b91a8e950f3d49068d3525a9047b9ebd","is_oa":true,"landing_page_url":"https://doaj.org/article/b91a8e950f3d49068d3525a9047b9ebd","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IET Information Security, Vol 2024 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1049/2024/6052651","is_oa":true,"landing_page_url":"https://doi.org/10.1049/2024/6052651","pdf_url":"https://downloads.hindawi.com/journals/ietis/2024/6052651.pdf","source":{"id":"https://openalex.org/S58852226","display_name":"IET Information Security","issn_l":"1751-8709","issn":["1751-8709","1751-8717"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310311714","host_organization_name":"Institution of Engineering and Technology","host_organization_lineage":["https://openalex.org/P4310311714"],"host_organization_lineage_names":["Institution of Engineering and Technology"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IET Information Security","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6000000238418579,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1231421488","display_name":null,"funder_award_id":"under","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2359438072","display_name":null,"funder_award_id":"2023YFC3306201","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G2376276132","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2553533332","display_name":null,"funder_award_id":"N2317004","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3973753714","display_name":null,"funder_award_id":"61772125","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4833408713","display_name":null,"funder_award_id":"31700","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5219054260","display_name":null,"funder_award_id":"61772125","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6073963252","display_name":null,"funder_award_id":"N2317004","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G6732846715","display_name":null,"funder_award_id":"61772125","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G7726157001","display_name":null,"funder_award_id":"Grant No.","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8951484681","display_name":null,"funder_award_id":"Grant","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4391913732.pdf"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W173953576","https://openalex.org/W1510216169","https://openalex.org/W1577229502","https://openalex.org/W1967308747","https://openalex.org/W2013623332","https://openalex.org/W2026179596","https://openalex.org/W2040084153","https://openalex.org/W2143087446","https://openalex.org/W2154654620","https://openalex.org/W2155040491","https://openalex.org/W2156186849","https://openalex.org/W2159047178","https://openalex.org/W2183863591","https://openalex.org/W2199845262","https://openalex.org/W2535199873","https://openalex.org/W2569238585","https://openalex.org/W2585287165","https://openalex.org/W2612145958","https://openalex.org/W2766393794","https://openalex.org/W2767079258","https://openalex.org/W2782492233","https://openalex.org/W2795178974","https://openalex.org/W2946537710","https://openalex.org/W2950017470","https://openalex.org/W2968964112","https://openalex.org/W3005206852","https://openalex.org/W3013638630","https://openalex.org/W3037145554","https://openalex.org/W3095102583","https://openalex.org/W3108801278","https://openalex.org/W3110581234","https://openalex.org/W3166373439","https://openalex.org/W3183199186","https://openalex.org/W3213275511","https://openalex.org/W3214336257","https://openalex.org/W3215903849","https://openalex.org/W4281735683","https://openalex.org/W4298171975","https://openalex.org/W4313406111"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W4287264924","https://openalex.org/W3137108924","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W1979110442","https://openalex.org/W1852009617","https://openalex.org/W1605991620","https://openalex.org/W4385261619"],"abstract_inverted_index":{"Two\u2010party":[0],"private":[1,72,114],"set":[2],"intersection":[3],"(PSI)":[4],"plays":[5],"a":[6,18,62,144,170,174,179,213],"pivotal":[7],"role":[8],"in":[9,17,84,128],"secure":[10,211],"two\u2010party":[11,71],"computation":[12],"protocols.":[13],"The":[14,109,206],"communication":[15,38,55,101,157,242],"cost":[16,102,243],"PSI":[19,65],"protocol":[20,66,208,246,253],"is":[21,118,139,209,247,271],"normally":[22],"influenced":[23],"by":[24,113],"the":[25,28,37,46,49,77,85,88,95,100,106,133,137,152,167,186,192,200,217,228,231,241,251,265],"sizes":[26,229],"of":[27,40,48,79,131,169,203,230,244,250],"participating":[29],"parties.":[30],"However,":[31],"for":[32,69],"parties":[33],"with":[34,120],"unbalanced":[35,70],"sets,":[36,73],"costs":[39],"existing":[41],"protocols":[42],"mainly":[43],"depend":[44],"on":[45,105,273],"size":[47],"larger":[50,96],"set,":[51,87,97],"leading":[52],"to":[53,75,94,141,151,161,264],"high":[54],"cost.":[56,158],"In":[57,159],"this":[58,163],"paper,":[59],"we":[60,165,224,259],"propose":[61,166],"low":[63],"communication\u2010cost":[64],"designed":[67],"specifically":[68],"aiming":[74],"enhance":[76],"efficiency":[78],"communication.":[80],"For":[81],"each":[82,129],"item":[83],"smaller":[86,107],"receiver":[89,138],"queries":[90,110],"whether":[91],"it":[92],"belongs":[93],"such":[98,204],"that":[99,127,226],"depends":[103],"solely":[104],"set.":[108],"are":[111,234],"implemented":[112],"information":[115],"retrieval":[116],"which":[117],"constructed":[119],"trapdoor":[121,134],"hash":[122,135,145,172,194],"function.":[123],"Our":[124,268],"investigation":[125],"indicates":[126],"instance":[130],"invoking":[132],"function,":[136],"required":[140],"transmit":[142],"both":[143],"key":[146,150],"and":[147,178,196,237,254],"an":[148],"encoding":[149,176,197],"sender,":[153],"thus":[154],"incurring":[155],"significant":[156],"order":[160],"address":[162],"concern,":[164],"utilization":[168],"seed":[171,175],"key,":[173,177],"Latin":[180],"square.":[181],"By":[182],"employing":[183],"these":[184],"components,":[185],"sender":[187],"can":[188],"autonomously":[189],"generate":[190],"all":[191],"necessary":[193],"keys":[195],"keys,":[198],"obviating":[199],"multiple":[201],"transmissions":[202],"keys.":[205],"proposed":[207],"provably":[210],"against":[212],"semihonest":[214],"adversary":[215],"under":[216,255],"Decisional":[218],"Diffie\u2013Hellman":[219],"assumption.":[220],"Through":[221],"implementation":[222],"demonstration,":[223],"showcase":[225],"when":[227],"two":[232],"sets":[233],"2":[235,238],"8":[236],"14":[239],",":[240],"our":[245],"only":[248],"3.3%":[249],"state\u2010of\u2010the\u2010art":[252,266],"100":[256],"Kbps":[257],"bandwidth,":[258],"achieve":[260],"1.46x":[261],"speedup":[262],"compared":[263],"protocol.":[267],"source":[269],"code":[270],"available":[272],"GitHub:":[274],"https://github.com/TAN-OpenLab/Unbanlanced-PSI":[275],".":[276]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
