{"id":"https://openalex.org/W4416707291","doi":"https://doi.org/10.1109/jiot.2025.3637285","title":"Hidden Facial Verification Scheme in IoT Cloud Environment Based on Homomorphic Privacy Information Retrieval","display_name":"Hidden Facial Verification Scheme in IoT Cloud Environment Based on Homomorphic Privacy Information Retrieval","publication_year":2025,"publication_date":"2025-11-26","ids":{"openalex":"https://openalex.org/W4416707291","doi":"https://doi.org/10.1109/jiot.2025.3637285"},"language":null,"primary_location":{"id":"doi:10.1109/jiot.2025.3637285","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3637285","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5113022330","display_name":"Wenhao Liu","orcid":"https://orcid.org/0009-0009-8571-5067"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Wenhao Liu","raw_affiliation_strings":["Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049151787","display_name":"Xu An Wang","orcid":"https://orcid.org/0000-0003-2070-4913"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xu An Wang","raw_affiliation_strings":["Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105922364","display_name":"Wei Zhao","orcid":"https://orcid.org/0000-0001-5274-7403"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["National Key Laboratory of Security Communication, China Electronic Science and Technology Group Corporation, Chengdu, China","The Thirtieth Research Institute of China Electronic Science and Technology Group Corporation, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"National Key Laboratory of Security Communication, China Electronic Science and Technology Group Corporation, Chengdu, China","institution_ids":["https://openalex.org/I150229711","https://openalex.org/I2800372957"]},{"raw_affiliation_string":"The Thirtieth Research Institute of China Electronic Science and Technology Group Corporation, Chengdu, China","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100756528","display_name":"Weiwei Jiang","orcid":"https://orcid.org/0000-0003-0953-5047"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weiwei Jiang","raw_affiliation_strings":["Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101528756","display_name":"Lingling Wu","orcid":"https://orcid.org/0000-0002-7166-3966"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lingling Wu","raw_affiliation_strings":["Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030828130","display_name":"Haibo Lei","orcid":"https://orcid.org/0000-0002-1333-8006"},"institutions":[{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haibo Lei","raw_affiliation_strings":["Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory for Network and Information Security of the PAP, Chinese People&#x2019;s Armed Police Force Engineering University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I4210134428"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5062494507","display_name":"Zhiquan Liu","orcid":"https://orcid.org/0000-0002-3934-2177"},"institutions":[{"id":"https://openalex.org/I159948400","display_name":"Jinan University","ror":"https://ror.org/02xe5ns62","country_code":"CN","type":"education","lineage":["https://openalex.org/I159948400"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiquan Liu","raw_affiliation_strings":["Jinan University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"Jinan University, Guangzhou, China","institution_ids":["https://openalex.org/I159948400"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060155268","display_name":"Dianhua Tang","orcid":"https://orcid.org/0000-0002-3169-4928"},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dianhua Tang","raw_affiliation_strings":["30th Research Institute, China Electronic Science and Technology Group Corporation, Chengdu, China","The Thirtieth Research Institute of China Electronic Science and Technology Group Corporation, Chengdu, China"],"affiliations":[{"raw_affiliation_string":"30th Research Institute, China Electronic Science and Technology Group Corporation, Chengdu, China","institution_ids":["https://openalex.org/I2800372957"]},{"raw_affiliation_string":"The Thirtieth Research Institute of China Electronic Science and Technology Group Corporation, Chengdu, China","institution_ids":["https://openalex.org/I2800372957"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":8,"corresponding_author_ids":["https://openalex.org/A5113022330"],"corresponding_institution_ids":["https://openalex.org/I4210134428"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.51164216,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"4","first_page":"6824","last_page":"6835"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.13410000503063202,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.13410000503063202,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.12409999966621399,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.1152999997138977,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8820000290870667},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7401999831199646},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.5519000291824341},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5385000109672546},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5151000022888184},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5074999928474426},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.47699999809265137},{"id":"https://openalex.org/keywords/facial-recognition-system","display_name":"Facial recognition system","score":0.45649999380111694},{"id":"https://openalex.org/keywords/information-sensitivity","display_name":"Information sensitivity","score":0.44110000133514404}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8820000290870667},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8661999702453613},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7401999831199646},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.5519000291824341},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5385000109672546},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5151000022888184},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5074999928474426},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.47699999809265137},{"id":"https://openalex.org/C31510193","wikidata":"https://www.wikidata.org/wiki/Q1192553","display_name":"Facial recognition system","level":3,"score":0.45649999380111694},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.44110000133514404},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.430400013923645},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4268999993801117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4251999855041504},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.4251999855041504},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3928000032901764},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.3605000078678131},{"id":"https://openalex.org/C204806902","wikidata":"https://www.wikidata.org/wiki/Q2333581","display_name":"Semantic security","level":5,"score":0.3531000018119812},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3427000045776367},{"id":"https://openalex.org/C23130292","wikidata":"https://www.wikidata.org/wiki/Q5275358","display_name":"Differential privacy","level":2,"score":0.3303999900817871},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3181999921798706},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3133000135421753},{"id":"https://openalex.org/C2777303404","wikidata":"https://www.wikidata.org/wiki/Q759757","display_name":"Convergence (economics)","level":2,"score":0.30709999799728394},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.2851000130176544},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.2802000045776367},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.27880001068115234},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26899999380111694},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.26010000705718994},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25780001282691956},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.25380000472068787},{"id":"https://openalex.org/C2777042071","wikidata":"https://www.wikidata.org/wiki/Q6509304","display_name":"Leakage (economics)","level":2,"score":0.2535000145435333},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.2533999979496002}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3637285","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3637285","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1488338708","https://openalex.org/W2031533839","https://openalex.org/W2073346043","https://openalex.org/W2096733369","https://openalex.org/W2401976587","https://openalex.org/W2768174108","https://openalex.org/W2883089683","https://openalex.org/W2915778496","https://openalex.org/W2922482186","https://openalex.org/W2948576725","https://openalex.org/W3004251986","https://openalex.org/W3014538993","https://openalex.org/W3021654819","https://openalex.org/W3027552584","https://openalex.org/W3132412944","https://openalex.org/W3136046080","https://openalex.org/W3138898594","https://openalex.org/W3178484057","https://openalex.org/W3185056286","https://openalex.org/W3203133756","https://openalex.org/W3205312502","https://openalex.org/W3209268963","https://openalex.org/W3213220428","https://openalex.org/W4220765846","https://openalex.org/W4281255367","https://openalex.org/W4283792528","https://openalex.org/W4285787155","https://openalex.org/W4285817849","https://openalex.org/W4309637077","https://openalex.org/W4312902356","https://openalex.org/W4312937923","https://openalex.org/W4320063407","https://openalex.org/W4384948632","https://openalex.org/W4386076336","https://openalex.org/W4390872098","https://openalex.org/W4401878786"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,9,96,111,116,120,126],"popularization":[2],"of":[3,11,40,70],"face":[4,56,72,90],"recognition":[5],"technology":[6],"in":[7,74,115,146],"IoT-Cloud,":[8],"problem":[10],"privacy":[12,25,84],"leakage":[13,42],"caused":[14],"by":[15,78],"it":[16],"is":[17,36,123,144],"becoming":[18],"more":[19,21],"and":[20,67,83,105,131],"serious.":[22],"Although":[23],"traditional":[24],"protection":[26],"schemes":[27],"can":[28,132],"improve":[29],"security":[30,147],"to":[31,129],"a":[32,38,134],"certain":[33],"extent,":[34],"there":[35],"still":[37],"risk":[39],"data":[41],"when":[43],"facing":[44],"semi-trusted":[45,97],"cloud":[46,98],"servers.":[47],"To":[48],"this":[49,51],"end,":[50],"paper":[52],"proposes":[53],"an":[54],"anonymized":[55,89,136],"verification":[57,113,138],"scheme":[58,93,143],"for":[59,88],"IoT":[60],"convergence":[61],"scenarios,":[62],"which":[63],"achieves":[64],"real-time":[65],"retrieval":[66,86],"secure":[68],"matching":[69,106],"dense":[71],"features":[73],"virtual":[75],"device":[76],"copies":[77],"combining":[79],"homomorphic":[80],"encryption":[81],"(CKKS)":[82],"information":[85,104],"(PIR)":[87],"verification.":[91],"The":[92,142],"ensures":[94],"that":[95,110],"server":[99],"cannot":[100],"obtain":[101],"user-specific":[102],"index":[103],"results.":[107],"Experiments":[108],"show":[109],"scheme\u2019s":[112],"accuracy":[114],"ciphertext":[117],"state":[118],"on":[119],"LFW":[121],"dataset":[122],"consistent":[124],"with":[125],"plaintext,":[127],"up":[128],"97.06%,":[130],"complete":[133],"privacy-protected":[135],"facial":[137],"process":[139],"within":[140],"seconds.":[141],"feasible":[145],"demanding":[148],"scenarios.":[149]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-27T00:00:00"}
