{"id":"https://openalex.org/W2063695313","doi":"https://doi.org/10.1109/icde.2013.6544870","title":"Secure nearest neighbor revisited","display_name":"Secure nearest neighbor revisited","publication_year":2013,"publication_date":"2013-04-01","ids":{"openalex":"https://openalex.org/W2063695313","doi":"https://doi.org/10.1109/icde.2013.6544870","mag":"2063695313"},"language":"en","primary_location":{"id":"doi:10.1109/icde.2013.6544870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icde.2013.6544870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 29th International Conference on Data Engineering (ICDE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100757927","display_name":"Bin Yao","orcid":"https://orcid.org/0000-0002-6478-4209"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Yao","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","Department of Computer Science and Engineering Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"Department of Computer Science and Engineering Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100450462","display_name":"Li Fei-Fei","orcid":"https://orcid.org/0000-0002-7481-0810"},"institutions":[{"id":"https://openalex.org/I223532165","display_name":"University of Utah","ror":"https://ror.org/03r0ha626","country_code":"US","type":"education","lineage":["https://openalex.org/I223532165"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Feifei Li","raw_affiliation_strings":["School of Computing, University of Utah, USA","[Sch. of Comput., Univ. of Utah, Salt Lake City, UT, USA]"],"affiliations":[{"raw_affiliation_string":"School of Computing, University of Utah, USA","institution_ids":["https://openalex.org/I223532165"]},{"raw_affiliation_string":"[Sch. of Comput., Univ. of Utah, Salt Lake City, UT, USA]","institution_ids":["https://openalex.org/I223532165"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010903591","display_name":"Xiaokui Xiao","orcid":"https://orcid.org/0000-0003-0914-4580"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Xiaokui Xiao","raw_affiliation_strings":["School of Computer Engineering, Nanyang Technological University, Singapore","Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, , Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computer Engineering, Nanyang Technological University, Singapore","institution_ids":["https://openalex.org/I172675005"]},{"raw_affiliation_string":"Sch. of Comput. Eng., Nanyang Technol. Univ., Singapore, , Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100757927"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":34.5964,"has_fulltext":false,"cited_by_count":227,"citation_normalized_percentile":{"value":0.99746369,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"733","last_page":"744"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7700818777084351},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7673575282096863},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.6830481290817261},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5579800605773926},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4658679962158203},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4146729111671448},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.33889007568359375},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3263123035430908},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24975165724754333}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7700818777084351},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7673575282096863},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.6830481290817261},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5579800605773926},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4658679962158203},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4146729111671448},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.33889007568359375},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3263123035430908},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24975165724754333}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/icde.2013.6544870","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icde.2013.6544870","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE 29th International Conference on Data Engineering (ICDE)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.295.770","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.295.770","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.sjtu.edu.cn/~yaobin/papers/snnicde.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.431.8493","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.8493","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.utah.edu/~lifeifei/papers/snn.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.431.850","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.431.850","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.utah.edu/~lifeifei/papers/snnicde.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1536017417","https://openalex.org/W1588338917","https://openalex.org/W1594685728","https://openalex.org/W1607140588","https://openalex.org/W1895952394","https://openalex.org/W1989519960","https://openalex.org/W2003500686","https://openalex.org/W2041480327","https://openalex.org/W2043508455","https://openalex.org/W2063695313","https://openalex.org/W2067636847","https://openalex.org/W2115016714","https://openalex.org/W2137180374","https://openalex.org/W2154448764","https://openalex.org/W2154496743","https://openalex.org/W2157855380","https://openalex.org/W2163992091","https://openalex.org/W2171027248","https://openalex.org/W2260906342","https://openalex.org/W2612623515","https://openalex.org/W2622005089","https://openalex.org/W4251391716","https://openalex.org/W6632222261","https://openalex.org/W6635387079","https://openalex.org/W6639572707","https://openalex.org/W6651487250","https://openalex.org/W6684200909"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W4310649982","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4395066784","https://openalex.org/W2011667854","https://openalex.org/W2802117553","https://openalex.org/W2098392677","https://openalex.org/W1589129854","https://openalex.org/W2939324531"],"abstract_inverted_index":{"In":[0],"this":[1,164],"paper,":[2],"we":[3,117,167],"investigate":[4],"the":[5,42,47,51,54,57,101,105,111,152,174,202,205,224,231,234],"secure":[6,81,134,222],"nearest":[7,155],"neighbor":[8,156],"(SNN)":[9],"problem,":[10],"in":[11,33,82,137],"which":[12],"a":[13,22,98,183],"client":[14],"issues":[15],"an":[16,29],"encrypted":[17,30,36],"query":[18,43,58,232],"point":[19,32],"E(q)":[20,160,178],"to":[21,41,49,79,132,150,181,200,229],"cloud":[23],"service":[24],"provider":[25],"and":[26,104,116,161,179,215,218,233],"asks":[27],"for":[28,68,204],"data":[31,55],"E(D)":[34,189],"(the":[35],"database)":[37],"that":[38,64,119,146,195,196],"is":[39,121,130,198],"closest":[40],"point,":[44],"without":[45],"allowing":[46],"server":[48],"learn":[50],"plaintexts":[52],"of":[53],"or":[56,92],"(and":[59],"its":[60],"result).":[61],"We":[62,95],"show":[63,118],"efficient":[65],"attacks":[66],"exist":[67],"existing":[69],"SNN":[70,102,120,170,206],"methods":[71,171,209],"[21],":[72],"[15],":[73],"even":[74],"though":[75],"they":[76,219],"were":[77],"claimed":[78],"be":[80,239],"standard":[83,138],"security":[84,139],"models":[85,140],"(such":[86],"as":[87,124,126,221,223],"indistinguishability":[88],"under":[89],"chosen":[90],"plaintext":[91],"ciphertext":[93],"attacks).":[94],"also":[96],"establish":[97],"relationship":[99],"between":[100,213],"problem":[103,109],"order-preserving":[106],"encryption":[107,225,242],"(OPE)":[108],"from":[110,188],"cryptography":[112],"field":[113],"[6],":[114,141],"[5],":[115,142],"at":[122],"least":[123],"hard":[125],"OPE.":[127],"Since":[128],"it":[129],"impossible":[131],"construct":[133],"OPE":[135],"schemes":[136],"our":[143],"results":[144],"imply":[145],"one":[147],"cannot":[148],"expect":[149],"find":[151],"exact":[153],"(encrypted)":[154,185],"based":[157],"on":[158],"only":[159,177],"E(D).":[162],"Given":[163],"hardness":[165],"result,":[166],"design":[168],"new":[169],"by":[172],"asking":[173],"server,":[175],"given":[176],"E(D),":[180],"return":[182],"relevant":[184],"partition":[186],"E(G)":[187,197],"(i.e.,":[190],"G":[191],"\u2286":[192],"D),":[193],"such":[194],"guaranteed":[199],"contain":[201],"answer":[203],"query.":[207],"Our":[208],"provide":[210],"customizable":[211],"tradeoff":[212],"efficiency":[214],"communication":[216],"cost,":[217],"are":[220],"scheme":[226],"E":[227,237],"used":[228],"encrypt":[230],"database,":[235],"where":[236],"can":[238],"any":[240],"well-established":[241],"schemes.":[243]},"counts_by_year":[{"year":2025,"cited_by_count":13},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":25},{"year":2019,"cited_by_count":24},{"year":2018,"cited_by_count":23},{"year":2017,"cited_by_count":29},{"year":2016,"cited_by_count":28},{"year":2015,"cited_by_count":22},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
