{"id":"https://openalex.org/W3003510987","doi":"https://doi.org/10.1109/access.2020.2970120","title":"Practical Data-in-Use Protection Using Binary Decision Diagrams","display_name":"Practical Data-in-Use Protection Using Binary Decision Diagrams","publication_year":2020,"publication_date":"2020-01-01","ids":{"openalex":"https://openalex.org/W3003510987","doi":"https://doi.org/10.1109/access.2020.2970120","mag":"3003510987"},"language":"en","primary_location":{"id":"doi:10.1109/access.2020.2970120","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2970120","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972396.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972396.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026224233","display_name":"Oleg Mazonka","orcid":"https://orcid.org/0000-0001-5131-9044"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Oleg Mazonka","raw_affiliation_strings":["Center for Cybersecurity, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054288765","display_name":"Esha Sarkar","orcid":"https://orcid.org/0000-0002-4473-7368"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Esha Sarkar","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Tandon School of Engineering, New York University, Brooklyn, USA"],"raw_orcid":"https://orcid.org/0000-0002-4473-7368","affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Tandon School of Engineering, New York University, Brooklyn, USA","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071386756","display_name":"Eduardo Chielle","orcid":"https://orcid.org/0000-0002-1938-912X"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eduardo Chielle","raw_affiliation_strings":["Center for Cybersecurity, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I57206974"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064496184","display_name":"Nektarios Georgios Tsoutsos","orcid":"https://orcid.org/0000-0002-5769-0124"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nektarios Georgios Tsoutsos","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Delaware, Newark, USA"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Delaware, Newark, USA","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043325974","display_name":"Michail Maniatakos","orcid":"https://orcid.org/0000-0001-6899-0651"},"institutions":[{"id":"https://openalex.org/I57206974","display_name":"New York University","ror":"https://ror.org/0190ak572","country_code":"US","type":"education","lineage":["https://openalex.org/I57206974"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Michail Maniatakos","raw_affiliation_strings":["Center for Cybersecurity, New York University Abu Dhabi, Abu Dhabi, UAE"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity, New York University Abu Dhabi, Abu Dhabi, UAE","institution_ids":["https://openalex.org/I57206974"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5026224233"],"corresponding_institution_ids":["https://openalex.org/I57206974"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.136,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.52562598,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"8","issue":null,"first_page":"23847","last_page":"23862"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.834538459777832},{"id":"https://openalex.org/keywords/operand","display_name":"Operand","score":0.8276753425598145},{"id":"https://openalex.org/keywords/binary-decision-diagram","display_name":"Binary decision diagram","score":0.8217266201972961},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8168972134590149},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6180557608604431},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5512826442718506},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5457188487052917},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5191335082054138},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.41710779070854187},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3480227589607239},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3055965304374695},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14082130789756775},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.08173805475234985}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.834538459777832},{"id":"https://openalex.org/C55526617","wikidata":"https://www.wikidata.org/wiki/Q719375","display_name":"Operand","level":2,"score":0.8276753425598145},{"id":"https://openalex.org/C3309909","wikidata":"https://www.wikidata.org/wiki/Q864155","display_name":"Binary decision diagram","level":2,"score":0.8217266201972961},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8168972134590149},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6180557608604431},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5512826442718506},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5457188487052917},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5191335082054138},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.41710779070854187},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3480227589607239},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3055965304374695},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14082130789756775},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.08173805475234985}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2020.2970120","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2970120","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972396.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2d0e6b955cb34a36839712177c469b99","is_oa":true,"landing_page_url":"https://doaj.org/article/2d0e6b955cb34a36839712177c469b99","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 8, Pp 23847-23862 (2020)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2020.2970120","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2020.2970120","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8948470/08972396.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.7699999809265137}],"awards":[],"funders":[{"id":"https://openalex.org/F4320313203","display_name":"New York University Abu Dhabi","ror":"https://ror.org/00e5k0821"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3003510987.pdf","grobid_xml":"https://content.openalex.org/works/W3003510987.grobid-xml"},"referenced_works_count":50,"referenced_works":["https://openalex.org/W56544557","https://openalex.org/W87154849","https://openalex.org/W774911181","https://openalex.org/W1480909796","https://openalex.org/W1498316612","https://openalex.org/W1524250393","https://openalex.org/W1534388293","https://openalex.org/W1575598731","https://openalex.org/W1798609567","https://openalex.org/W1994143452","https://openalex.org/W1996360405","https://openalex.org/W2000451777","https://openalex.org/W2022249812","https://openalex.org/W2031533839","https://openalex.org/W2052341609","https://openalex.org/W2052353102","https://openalex.org/W2056489112","https://openalex.org/W2065890363","https://openalex.org/W2080267935","https://openalex.org/W2112395425","https://openalex.org/W2119028650","https://openalex.org/W2132172731","https://openalex.org/W2138016069","https://openalex.org/W2139171604","https://openalex.org/W2152926062","https://openalex.org/W2156030242","https://openalex.org/W2285334798","https://openalex.org/W2401959250","https://openalex.org/W2534485457","https://openalex.org/W2536656707","https://openalex.org/W2606882085","https://openalex.org/W2752013983","https://openalex.org/W2766393343","https://openalex.org/W2792498333","https://openalex.org/W2807403537","https://openalex.org/W2883613460","https://openalex.org/W2888798936","https://openalex.org/W2899157124","https://openalex.org/W2933066117","https://openalex.org/W2951557794","https://openalex.org/W2963311060","https://openalex.org/W3122396833","https://openalex.org/W4210300416","https://openalex.org/W6622512067","https://openalex.org/W6634280684","https://openalex.org/W6676946995","https://openalex.org/W6679763910","https://openalex.org/W6753443810","https://openalex.org/W6756077037","https://openalex.org/W6891923490"],"related_works":["https://openalex.org/W2556282987","https://openalex.org/W1533508804","https://openalex.org/W1970370079","https://openalex.org/W2050923821","https://openalex.org/W2098637578","https://openalex.org/W2333680585","https://openalex.org/W1999746819","https://openalex.org/W1996625680","https://openalex.org/W4378651692","https://openalex.org/W2887779253"],"abstract_inverted_index":{"Protection":[0],"of":[1,7,114,143,153],"data-in-use,":[2],"contrary":[3,48],"to":[4,27,49,59,74,91,96,169],"the":[5],"protection":[6,45],"data-at-rest":[8],"or":[9],"data-in-transit,":[10],"remains":[11],"a":[12,42,70,108],"challenge.":[13],"Cryptography":[14],"advances":[15],"such":[16,63],"as":[17,64],"Fully":[18],"Homomorphic":[19],"Encryption":[20],"(FHE)":[21],"provide":[22],"theoretical,":[23],"albeit":[24],"impractical,":[25],"solutions":[26],"functionally-complete":[28],"computation":[29,57],"over":[30,117],"encrypted":[31,118],"operands,":[32],"necessary":[33],"for":[34,81],"general-purpose":[35,82],"computation.":[36,83],"In":[37],"this":[38],"work,":[39],"we":[40,85,106],"propose":[41],"practical":[43,158],"data-in-use":[44],"mechanism":[46],"that,":[47],"application-specific":[50],"homomorphic":[51],"encryption":[52],"approaches,":[53],"focuses":[54],"on":[55,100],"arbitrary":[56],"native":[58],"established":[60],"programming":[61,94],"languages,":[62],"C++.":[65],"Therefore,":[66],"our":[67,139],"work":[68],"provides":[69],"more":[71],"efficient":[72,121],"alternative":[73],"FHE":[75,148],"schemes":[76,149],"that":[77,110,123,138],"can":[78,129],"be":[79],"used":[80],"Specifically,":[84],"use":[86],"Binary":[87],"Decision":[88],"Diagrams":[89],"(BDD)":[90],"transform":[92],"high-level":[93],"operations":[95],"their":[97],"equivalents":[98],"working":[99],"protected":[101],"data.":[102],"To":[103],"automate":[104],"this,":[105],"develop":[107],"framework":[109,161],"allows":[111],"automatic":[112],"conversion":[113],"program":[115],"expressions":[116],"operands":[119],"into":[120],"circuits":[122],"are":[124],"reduced":[125],"using":[126],"BDDs":[127],"and":[128,150],"simulate":[130],"corresponding":[131],"composed":[132],"operations.":[133],"Our":[134,160],"experimental":[135],"results":[136],"show":[137],"methodology":[140],"is":[141,162],"orders":[142],"magnitude":[144],"faster":[145],"than":[146],"state-of-the-art":[147],"enables":[151],"execution":[152],"real":[154],"C++":[155],"applications":[156],"with":[157,164],"overheads.":[159],"complemented":[163],"security":[165],"analysis":[166],"proving":[167],"resistance":[168],"different":[170],"attack":[171],"methods.":[172]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
