{"id":"https://openalex.org/W4295832385","doi":"https://doi.org/10.1109/tcss.2022.3200940","title":"SE-<i>P</i>\u00b2\u03bcm: Secure and Efficient Privacy-Preserving User-Profile Matching Protocol for Social Networks","display_name":"SE-<i>P</i>\u00b2\u03bcm: Secure and Efficient Privacy-Preserving User-Profile Matching Protocol for Social Networks","publication_year":2022,"publication_date":"2022-09-13","ids":{"openalex":"https://openalex.org/W4295832385","doi":"https://doi.org/10.1109/tcss.2022.3200940"},"language":"en","primary_location":{"id":"doi:10.1109/tcss.2022.3200940","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3200940","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100662562","display_name":"Jianhong Zhang","orcid":"https://orcid.org/0000-0001-8674-3988"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]},{"id":"https://openalex.org/I163151501","display_name":"Hangzhou Normal University","ror":"https://ror.org/014v1mr15","country_code":"CN","type":"education","lineage":["https://openalex.org/I163151501"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jianhong Zhang","raw_affiliation_strings":["School of Information Science and Technology, North China University of Technology, Beijing, China","Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]},{"raw_affiliation_string":"Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University, Hangzhou, China","institution_ids":["https://openalex.org/I163151501"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091804324","display_name":"Haoting Hao","orcid":null},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoting Hao","raw_affiliation_strings":["School of Information Sciences and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087596079","display_name":"Hongwei Su","orcid":"https://orcid.org/0009-0008-2818-3458"},"institutions":[{"id":"https://openalex.org/I1456306","display_name":"North China University of Technology","ror":"https://ror.org/01nky7652","country_code":"CN","type":"education","lineage":["https://openalex.org/I1456306"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongwei Su","raw_affiliation_strings":["School of Information Sciences and Technology, North China University of Technology, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information Sciences and Technology, North China University of Technology, Beijing, China","institution_ids":["https://openalex.org/I1456306"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100662562"],"corresponding_institution_ids":["https://openalex.org/I1456306","https://openalex.org/I163151501"],"apc_list":null,"apc_paid":null,"fwci":0.1326,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.528471,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"10","issue":"6","first_page":"3295","last_page":"3307"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6876178979873657},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6747229099273682},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5845664739608765},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5445927977561951},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.5335133075714111},{"id":"https://openalex.org/keywords/privacy-protection","display_name":"Privacy protection","score":0.48615404963493347},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.472231388092041},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4218562841415405},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.10961413383483887}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6876178979873657},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6747229099273682},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5845664739608765},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5445927977561951},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.5335133075714111},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.48615404963493347},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.472231388092041},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4218562841415405},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.10961413383483887},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tcss.2022.3200940","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcss.2022.3200940","pdf_url":null,"source":{"id":"https://openalex.org/S2490693980","display_name":"IEEE Transactions on Computational Social Systems","issn_l":"2329-924X","issn":["2329-924X","2373-7476"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Computational Social Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G3305194865","display_name":null,"funder_award_id":"M22002","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G4164547663","display_name":null,"funder_award_id":"4212019","funder_id":"https://openalex.org/F4320322919","funder_display_name":"Natural Science Foundation of Beijing Municipality"},{"id":"https://openalex.org/G7376060000","display_name":null,"funder_award_id":"62172005","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322919","display_name":"Natural Science Foundation of Beijing Municipality","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1534512990","https://openalex.org/W1542414649","https://openalex.org/W2018608870","https://openalex.org/W2108834246","https://openalex.org/W2123845384","https://openalex.org/W2132288739","https://openalex.org/W2139979322","https://openalex.org/W2144644951","https://openalex.org/W2152832755","https://openalex.org/W2439367678","https://openalex.org/W2617479905","https://openalex.org/W2786793274","https://openalex.org/W2940697910","https://openalex.org/W3045880028","https://openalex.org/W3087006843","https://openalex.org/W3108001324","https://openalex.org/W4238181984","https://openalex.org/W4283704952","https://openalex.org/W6631814283","https://openalex.org/W6678667773"],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2940702331","https://openalex.org/W2905822832","https://openalex.org/W4225340788","https://openalex.org/W4318485713"],"abstract_inverted_index":{"By":[0],"matching":[1,31,107,126,142,158,177,197],"attributes":[2],"in":[3,34,73],"user":[4,21,71,85,105,184,195],"profiles,":[5],"social":[6,15,74,110],"networking":[7],"services":[8],"(SNSs)":[9],"are":[10,144],"able":[11,81],"to":[12,66,82,170,179],"create":[13],"certain":[14],"relationships":[16],"between":[17],"different":[18],"users.":[19,28],"However,":[20],"profiles":[22],"often":[23],"contain":[24],"sensitive":[25],"information":[26],"about":[27],"If":[29],"data":[30,60,72],"is":[32],"done":[33],"plaintext,":[35],"users\u2019":[36],"privacy":[37,69,186],"and":[38,94,137,187],"security":[39],"will":[40],"face":[41],"serious":[42],"challenges.":[43],"Most":[44],"recently,":[45],"the":[46,68,129,141,148,199],"hacking":[47],"incident":[48],"of":[49,59,70,150],"Ashley":[50],"Madison":[51],"website,":[52],"which":[53],"incurred":[54],"more":[55],"than":[56],"60":[57],"GB":[58],"being":[61],"leaked,":[62],"has":[63],"prompted":[64],"researchers":[65],"explore":[67],"networks":[75,111],"urgently.":[76],"Existing":[77],"schemes":[78],"may":[79],"be":[80],"achieve":[83],"privacy-preserving":[84],"profile":[86,106,185,196],"matching,":[87],"but":[88],"they":[89],"require":[90],"high":[91],"communication":[92],"bandwidth":[93],"complex":[95],"computational":[96],"costs.":[97],"To":[98],"address":[99],"them,":[100],"we":[101],"proposed":[102],"a":[103],"private":[104],"protocol":[108],"for":[109],"using":[112],"<inline-formula":[113,120,152,171],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[114,121,153,172],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">":[115,122,154,173],"<tex-math":[116,123,155,174],"notation=\"LaTeX\">$t$":[117,156,175],"</tex-math></inline-formula>":[118,125,157,176],"-out-of-":[119],"notation=\"LaTeX\">$n$":[124],"servers.":[127],"Applying":[128],"Chinese":[130],"remainder":[131],"theorem":[132],"(CRT),":[133],"Bloom":[134],"filter":[135],"technique,":[136],"skyline":[138],"computation":[139],"idea,":[140],"users":[143],"efficiently":[145],"returned":[146],"with":[147,192],"help":[149],"any":[151],"server":[159],"without":[160],"disclosing":[161],"their":[162],"identities.":[163],"In":[164],"addition,":[165],"our":[166,204],"scheme":[167,205],"allows":[168],"up":[169],"servers":[178],"collude":[180],"while":[181],"simultaneously":[182],"ensuring":[183],"query":[188],"privacy.":[189],"Finally,":[190],"compared":[191],"two":[193],"recent":[194],"protocols,":[198],"performance":[200],"results":[201],"demonstrate":[202],"that":[203],"outperforms":[206],"them.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
