{"id":"https://openalex.org/W4412444871","doi":"https://doi.org/10.1109/jiot.2025.3589237","title":"Efficient Privacy-Preserving Similarity Retrieval With Fine-Grained Access Control","display_name":"Efficient Privacy-Preserving Similarity Retrieval With Fine-Grained Access Control","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4412444871","doi":"https://doi.org/10.1109/jiot.2025.3589237"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3589237","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3589237","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100444776","display_name":"Yingying Li","orcid":"https://orcid.org/0000-0002-3999-2647"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yingying Li","raw_affiliation_strings":["School of Mathematics, Hangzhou Normal University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-3999-2647","affiliations":[{"raw_affiliation_string":"School of Mathematics, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102017758","display_name":"Feng Li","orcid":"https://orcid.org/0000-0002-8294-7606"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Feng Li","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-8294-7606","affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053519178","display_name":"Fuqun Wang","orcid":"https://orcid.org/0000-0002-6178-3630"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuqun Wang","raw_affiliation_strings":["School of Mathematics, Hangzhou Normal University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-6178-3630","affiliations":[{"raw_affiliation_string":"School of Mathematics, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["College of Cyber Security, Jinan University, Guangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-3934-2177","affiliations":[{"raw_affiliation_string":"College of Cyber Security, Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074869490","display_name":"Yan Zhu","orcid":"https://orcid.org/0000-0001-9620-7505"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yan Zhu","raw_affiliation_strings":["School of Mathematics, Hangzhou Normal University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Mathematics, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022673825","display_name":"Qi Xie","orcid":"https://orcid.org/0000-0002-8808-3124"},"institutions":[{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qi Xie","raw_affiliation_strings":["School of Mathematics, Hangzhou Normal University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0002-8808-3124","affiliations":[{"raw_affiliation_string":"School of Mathematics, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086688453","display_name":"Song Han","orcid":"https://orcid.org/0000-0001-7758-3679"},"institutions":[{"id":"https://openalex.org/I4400573310","display_name":"Hangzhou City University","ror":"https://ror.org/01wck0s05","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573310"]},{"id":"https://openalex.org/I6469544","display_name":"City University of Macau","ror":"https://ror.org/04gpd4q15","country_code":"MO","type":"education","lineage":["https://openalex.org/I6469544"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN","MO"],"is_corresponding":false,"raw_author_name":"Song Han","raw_affiliation_strings":["School of Computer and Computing Science, Zhejiang University City College (a.k.a Hangzhou City University), Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-7758-3679","affiliations":[{"raw_affiliation_string":"School of Computer and Computing Science, Zhejiang University City College (a.k.a Hangzhou City University), Hangzhou, China","institution_ids":["https://openalex.org/I76130692","https://openalex.org/I6469544","https://openalex.org/I4400573310"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5100444776"],"corresponding_institution_ids":["https://openalex.org/I163151501"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.08182468,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9814000129699707,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8606067895889282},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4959627091884613},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.49412301182746887},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4430602788925171},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32291311025619507},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24086055159568787},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.19132956862449646}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8606067895889282},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4959627091884613},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.49412301182746887},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4430602788925171},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32291311025619507},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24086055159568787},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.19132956862449646},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3589237","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3589237","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5362613922","display_name":null,"funder_award_id":"62402155","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Privacy-preserving":[0],"similarity":[1,66,131],"retrieval":[2,31,67,92,132],"for":[3,69,123,174],"ciphertext":[4,70,169],"images":[5,71,170],"has":[6],"broad":[7],"applications":[8],"in":[9],"Internet":[10],"of":[11,40],"Things":[12],"(IoT)":[13],"areas,":[14],"including":[15],"smart":[16],"healthcare,":[17],"face":[18],"recognition,":[19],"and":[20,32,77,106,114,130,141,151],"social":[21],"networking.":[22],"However,":[23],"most":[24],"existing":[25,160],"privacy-preserving":[26],"schemes":[27],"suffer":[28],"from":[29],"inefficient":[30],"limited":[33],"security":[34,101],"guarantees":[35],"due":[36],"to":[37,90,154,166],"the":[38,146,164],"use":[39],"unreasonable":[41],"encryption":[42,113],"methods.":[43],"In":[44],"addition,":[45],"those":[46],"supporting":[47],"fine-grained":[48,78],"access":[49,79,121,128],"control":[50,122],"often":[51],"lack":[52],"scalability":[53],"or":[54],"are":[55],"computationally":[56],"inefficient.":[57],"To":[58],"address":[59],"these":[60],"challenges,":[61],"we":[62,82,99,119],"propose":[63],"an":[64,84],"efficient":[65],"scheme":[68,148],"that":[72,145],"ensures":[73],"both":[74],"privacy":[75],"preservation":[76],"control.":[80],"First,":[81],"construct":[83],"encrypted":[85],"index":[86],"tree":[87],"using":[88],"clustering":[89],"improve":[91],"efficiency":[93],"while":[94],"preserving":[95],"high":[96],"recall.":[97],"Second,":[98],"achieve":[100],"against":[102],"chosen-plaintext":[103],"attacks":[104],"(CPA)":[105],"result":[107],"verification":[108,129],"by":[109],"employing":[110],"symmetric":[111],"homomorphic":[112],"Merkle":[115],"hash":[116],"tree.":[117],"Third,":[118],"realize":[120],"each":[124],"image,":[125],"enabling":[126],"simultaneous":[127],"via":[133],"a":[134],"single":[135],"inner":[136],"product":[137],"operation.":[138],"Our":[139],"theoretical":[140],"experimental":[142],"analysis":[143],"shows":[144],"proposed":[147],"is":[149],"CPA-secure":[150,161],"achieves":[152],"up":[153],"100\u00d7":[155],"faster":[156],"query":[157],"processing":[158],"than":[159],"schemes,":[162],"with":[163],"ability":[165],"retrieve":[167],"2000":[168],"within":[171],"0.5":[172],"seconds":[173],"128-dimensional":[175],"feature":[176],"vectors.":[177]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
