{"id":"https://openalex.org/W2913833113","doi":"https://doi.org/10.1109/iwqos.2018.8624145","title":"Authentication of Multi-Dimensional Top-&lt;tex&gt;$K$&lt;/tex&gt; Query on Untrusted Server","display_name":"Authentication of Multi-Dimensional Top-&lt;tex&gt;$K$&lt;/tex&gt; Query on Untrusted Server","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2913833113","doi":"https://doi.org/10.1109/iwqos.2018.8624145","mag":"2913833113"},"language":"en","primary_location":{"id":"doi:10.1109/iwqos.2018.8624145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2018.8624145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017533636","display_name":"Xiaoyu Zhu","orcid":"https://orcid.org/0000-0002-6815-3754"},"institutions":[{"id":"https://openalex.org/I139660479","display_name":"Central South University","ror":"https://ror.org/00f1zfq44","country_code":"CN","type":"education","lineage":["https://openalex.org/I139660479"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaoyu Zhu","raw_affiliation_strings":["School of Information Science and Engineering, Central South University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Central South University, Changsha, China","institution_ids":["https://openalex.org/I139660479"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100600528","display_name":"Jie Wu","orcid":"https://orcid.org/0000-0002-3472-1717"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jie Wu","raw_affiliation_strings":["Center for Networked Computing, Temple University, PA, USA"],"affiliations":[{"raw_affiliation_string":"Center for Networked Computing, Temple University, PA, USA","institution_ids":["https://openalex.org/I84392919"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5104014736","display_name":"Wei Chang","orcid":"https://orcid.org/0009-0001-5693-7877"},"institutions":[{"id":"https://openalex.org/I51077184","display_name":"Saint Joseph's University","ror":"https://ror.org/05q87sg56","country_code":"US","type":"education","lineage":["https://openalex.org/I51077184"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Wei Chang","raw_affiliation_strings":["Department of Computer Science, Saint Joseph's University, PA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Saint Joseph's University, PA, USA","institution_ids":["https://openalex.org/I51077184"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100386726","display_name":"Guojun Wang","orcid":"https://orcid.org/0000-0001-9875-4182"},"institutions":[{"id":"https://openalex.org/I37987034","display_name":"Guangzhou University","ror":"https://ror.org/05ar8rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I37987034"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guojun Wang","raw_affiliation_strings":["School of Computer, Guangzhou University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer, Guangzhou University, Guangzhou, China","institution_ids":["https://openalex.org/I37987034"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100432505","display_name":"Qin Liu","orcid":"https://orcid.org/0000-0003-0236-4513"},"institutions":[{"id":"https://openalex.org/I16609230","display_name":"Hunan University","ror":"https://ror.org/05htk5m33","country_code":"CN","type":"education","lineage":["https://openalex.org/I16609230"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Liu","raw_affiliation_strings":["School of Computer Science and Electronic Engineering, Hunan University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Electronic Engineering, Hunan University, Changsha, China","institution_ids":["https://openalex.org/I16609230"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017533636"],"corresponding_institution_ids":["https://openalex.org/I139660479"],"apc_list":null,"apc_paid":null,"fwci":0.4887,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.74447277,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8380836844444275},{"id":"https://openalex.org/keywords/query-expansion","display_name":"Query expansion","score":0.6848511099815369},{"id":"https://openalex.org/keywords/query-optimization","display_name":"Query optimization","score":0.6562010049819946},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.6418326497077942},{"id":"https://openalex.org/keywords/web-search-query","display_name":"Web search query","score":0.5749374032020569},{"id":"https://openalex.org/keywords/sargable","display_name":"Sargable","score":0.5737390518188477},{"id":"https://openalex.org/keywords/query-language","display_name":"Query language","score":0.5390147566795349},{"id":"https://openalex.org/keywords/ranking","display_name":"Ranking (information retrieval)","score":0.5380399227142334},{"id":"https://openalex.org/keywords/web-query-classification","display_name":"Web query classification","score":0.5343782901763916},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5264932513237},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.49455496668815613},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.44744354486465454},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.4442264139652252},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4383111000061035},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33673352003097534},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.2550554573535919},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.18457740545272827},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12974724173545837},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.08766195178031921},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.07395508885383606}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8380836844444275},{"id":"https://openalex.org/C99016210","wikidata":"https://www.wikidata.org/wiki/Q5488129","display_name":"Query expansion","level":2,"score":0.6848511099815369},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.6562010049819946},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.6418326497077942},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.5749374032020569},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.5737390518188477},{"id":"https://openalex.org/C192028432","wikidata":"https://www.wikidata.org/wiki/Q845739","display_name":"Query language","level":2,"score":0.5390147566795349},{"id":"https://openalex.org/C189430467","wikidata":"https://www.wikidata.org/wiki/Q7293293","display_name":"Ranking (information retrieval)","level":2,"score":0.5380399227142334},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.5343782901763916},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5264932513237},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.49455496668815613},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.44744354486465454},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.4442264139652252},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4383111000061035},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33673352003097534},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.2550554573535919},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.18457740545272827},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12974724173545837},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.08766195178031921},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.07395508885383606},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iwqos.2018.8624145","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iwqos.2018.8624145","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE/ACM 26th International Symposium on Quality of Service (IWQoS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1486370790","https://openalex.org/W1566345534","https://openalex.org/W1923841234","https://openalex.org/W2052388228","https://openalex.org/W2084945437","https://openalex.org/W2093396996","https://openalex.org/W2142160461","https://openalex.org/W2191874116","https://openalex.org/W2439128763","https://openalex.org/W2529689813","https://openalex.org/W2532401748","https://openalex.org/W2536453351","https://openalex.org/W2642179594","https://openalex.org/W2887068905","https://openalex.org/W6633819675","https://openalex.org/W6728332274","https://openalex.org/W6728865092","https://openalex.org/W6739467661","https://openalex.org/W6753891338"],"related_works":["https://openalex.org/W2096359267","https://openalex.org/W2572349046","https://openalex.org/W2026738364","https://openalex.org/W2146885082","https://openalex.org/W2017989738","https://openalex.org/W1981131819","https://openalex.org/W2392799717","https://openalex.org/W3125756434","https://openalex.org/W2124814993","https://openalex.org/W2186703450"],"abstract_inverted_index":{"Consider":[0],"a":[1,26,44,88],"database":[2],"where":[3],"each":[4,39,120,126],"record":[5,121],"has":[6],"multiple":[7],"attributes.":[8],"An":[9],"untrusted":[10],"server":[11],"is":[12,57,64,86],"in":[13,67],"charge":[14],"of":[15,34,139,153],"processing":[16],"queries":[17],"over":[18],"this":[19,99],"database,":[20],"and":[21,122,137,147],"we":[22,101,149],"want":[23],"to":[24,30,42,91,106,132],"provide":[25],"mechanism":[27],"for":[28,119],"users":[29,131],"verify":[31,134],"the":[32,72,93,135,151],"correctness":[33],"their":[35],"query":[36,63,74,96,110,142],"results.":[37,97,143],"Here":[38],"query,":[40,47,84],"referred":[41],"as":[43,71],"multi-dimensional":[45,82,94,108,140],"top-k":[46,62,83,95,109,141],"retrieves":[48],"k":[49],"records":[50],"whose":[51],"output":[52],"with":[53],"user-supplied":[54],"ranking":[55],"function":[56],"among":[58],"top":[59],"k.":[60],"Multi-dimensional":[61],"widely":[65],"used":[66],"real":[68],"applications.":[69],"However,":[70],"traditional":[73],"authentication":[75,104],"methods":[76],"cannot":[77],"be":[78],"directly":[79],"deployed":[80],"on":[81,112,125],"it":[85],"still":[87],"challenging":[89],"problem":[90],"authenticate":[92],"In":[98],"paper,":[100],"propose":[102],"an":[103],"solution":[105,129],"support":[107],"based":[111],"signature":[113,117],"chain.":[114],"By":[115],"using":[116],"chain":[118],"its":[123],"successors":[124],"dimension,":[127],"our":[128,154],"allows":[130],"efficiently":[133],"soundness":[136],"completeness":[138],"Through":[144],"theoretical":[145],"analysis":[146],"simulation,":[148],"demonstrate":[150],"effectiveness":[152],"proposed":[155],"solution.":[156]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
