{"id":"https://openalex.org/W2904455524","doi":"https://doi.org/10.1109/gcce.2018.8574615","title":"Protecting Personal Information using Homomorphic Encryption for Person Re-identification","display_name":"Protecting Personal Information using Homomorphic Encryption for Person Re-identification","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2904455524","doi":"https://doi.org/10.1109/gcce.2018.8574615","mag":"2904455524"},"language":"en","primary_location":{"id":"doi:10.1109/gcce.2018.8574615","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2018.8574615","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038448204","display_name":"Morita Kazunari","orcid":null},"institutions":[{"id":"https://openalex.org/I4588055","display_name":"Tottori University","ror":"https://ror.org/024yc3q36","country_code":"JP","type":"education","lineage":["https://openalex.org/I4588055"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Kazunari Morita","raw_affiliation_strings":["Graduate School of Engineering, Tottori University, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Engineering, Tottori University, Japan","institution_ids":["https://openalex.org/I4588055"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102257024","display_name":"Hiroki Yoshimura","orcid":null},"institutions":[{"id":"https://openalex.org/I4588055","display_name":"Tottori University","ror":"https://ror.org/024yc3q36","country_code":"JP","type":"education","lineage":["https://openalex.org/I4588055"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Hiroki Yoshimura","raw_affiliation_strings":["Cross-informatics Research Center, Tottori University, Japan"],"affiliations":[{"raw_affiliation_string":"Cross-informatics Research Center, Tottori University, Japan","institution_ids":["https://openalex.org/I4588055"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054129619","display_name":"Masashi Nishiyama","orcid":"https://orcid.org/0000-0002-5964-3209"},"institutions":[{"id":"https://openalex.org/I4588055","display_name":"Tottori University","ror":"https://ror.org/024yc3q36","country_code":"JP","type":"education","lineage":["https://openalex.org/I4588055"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masashi Nishiyama","raw_affiliation_strings":["Cross-informatics Research Center, Tottori University, Japan"],"affiliations":[{"raw_affiliation_string":"Cross-informatics Research Center, Tottori University, Japan","institution_ids":["https://openalex.org/I4588055"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5059654927","display_name":"Yoshio Iwai","orcid":"https://orcid.org/0000-0003-2248-4563"},"institutions":[{"id":"https://openalex.org/I4588055","display_name":"Tottori University","ror":"https://ror.org/024yc3q36","country_code":"JP","type":"education","lineage":["https://openalex.org/I4588055"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshio Iwai","raw_affiliation_strings":["Cross-informatics Research Center, Tottori University, Japan"],"affiliations":[{"raw_affiliation_string":"Cross-informatics Research Center, Tottori University, Japan","institution_ids":["https://openalex.org/I4588055"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038448204"],"corresponding_institution_ids":["https://openalex.org/I4588055"],"apc_list":null,"apc_paid":null,"fwci":0.4887,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74030587,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"10","issue":null,"first_page":"166","last_page":"167"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.9674392938613892},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.692188024520874},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6763410568237305},{"id":"https://openalex.org/keywords/homomorphic-secret-sharing","display_name":"Homomorphic secret sharing","score":0.565418004989624},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5074781775474548},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4877668023109436},{"id":"https://openalex.org/keywords/on-the-fly-encryption","display_name":"On-the-fly encryption","score":0.4623701572418213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.443476140499115},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.41954436898231506},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.24414962530136108},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.19297295808792114},{"id":"https://openalex.org/keywords/secure-multi-party-computation","display_name":"Secure multi-party computation","score":0.10306036472320557}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.9674392938613892},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.692188024520874},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6763410568237305},{"id":"https://openalex.org/C132161212","wikidata":"https://www.wikidata.org/wiki/Q5891458","display_name":"Homomorphic secret sharing","level":4,"score":0.565418004989624},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5074781775474548},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4877668023109436},{"id":"https://openalex.org/C147977885","wikidata":"https://www.wikidata.org/wiki/Q117010","display_name":"On-the-fly encryption","level":3,"score":0.4623701572418213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.443476140499115},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.41954436898231506},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.24414962530136108},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.19297295808792114},{"id":"https://openalex.org/C18396474","wikidata":"https://www.wikidata.org/wiki/Q2465888","display_name":"Secure multi-party computation","level":3,"score":0.10306036472320557},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcce.2018.8574615","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcce.2018.8574615","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 7th Global Conference on Consumer Electronics (GCCE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6899999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W2106053110","https://openalex.org/W2111025459","https://openalex.org/W2152926062","https://openalex.org/W2398715209","https://openalex.org/W2435473771","https://openalex.org/W2609740838","https://openalex.org/W2614081991","https://openalex.org/W6675751002","https://openalex.org/W6717974185","https://openalex.org/W6737924777"],"related_works":["https://openalex.org/W4316659877","https://openalex.org/W3035389378","https://openalex.org/W2607647996","https://openalex.org/W1540514112","https://openalex.org/W2915067502","https://openalex.org/W2624912447","https://openalex.org/W3157882375","https://openalex.org/W3206362444","https://openalex.org/W2793967262","https://openalex.org/W3045127875"],"abstract_inverted_index":{"We":[0],"investigate":[1],"how":[2],"to":[3,7,35,57],"protect":[4],"features":[5,27],"corresponding":[6],"personal":[8,46],"information":[9],"using":[10],"homomorphic":[11,50,84],"encryption":[12,21,85],"when":[13],"matching":[14],"people":[15],"in":[16,75],"several":[17],"camera":[18],"views.":[19],"Homomorphic":[20],"can":[22],"compute":[23],"a":[24,37,41],"distance":[25],"between":[26],"without":[28,83],"decryption.":[29],"Thus,":[30],"our":[31,52],"method":[32,53],"is":[33,71],"able":[34],"use":[36],"computing":[38],"server":[39],"on":[40],"public":[42],"network":[43],"while":[44],"protecting":[45],"information.":[47],"To":[48],"apply":[49],"encryption,":[51],"uses":[54],"linear":[55,87],"quantization":[56],"represent":[58],"each":[59],"element":[60],"of":[61,78],"the":[62,76],"feature":[63],"as":[64],"integers.":[65],"Experimental":[66],"results":[67],"show":[68],"that":[69],"there":[70],"no":[72],"significant":[73],"difference":[74],"accuracy":[77],"person":[79],"re-identification":[80],"with":[81],"or":[82],"and":[86],"quantization.":[88]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
