{"id":"https://openalex.org/W2358010479","doi":"https://doi.org/10.1109/tdsc.2016.2568182","title":"On the Efficiency of FHE-Based Private Queries","display_name":"On the Efficiency of FHE-Based Private Queries","publication_year":2016,"publication_date":"2016-05-12","ids":{"openalex":"https://openalex.org/W2358010479","doi":"https://doi.org/10.1109/tdsc.2016.2568182","mag":"2358010479"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2568182","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2568182","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100638898","display_name":"Myungsun Kim","orcid":"https://orcid.org/0000-0002-0461-3053"},"institutions":[{"id":"https://openalex.org/I16764540","display_name":"University of Suwon","ror":"https://ror.org/03ysk5e42","country_code":"KR","type":"education","lineage":["https://openalex.org/I16764540"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Myungsun Kim","raw_affiliation_strings":["Department of Information Security, The University of Suwon, Hwaseong, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Information Security, The University of Suwon, Hwaseong, South Korea","institution_ids":["https://openalex.org/I16764540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016413171","display_name":"Hyung Tae Lee","orcid":"https://orcid.org/0000-0002-0920-2026"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Hyung Tae Lee","raw_affiliation_strings":["Division of Mathematical SciencesSchool of Physical & Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-0920-2026","affiliations":[{"raw_affiliation_string":"Division of Mathematical SciencesSchool of Physical & Mathematical Sciences, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063268716","display_name":"San Ling","orcid":"https://orcid.org/0000-0002-1978-3557"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"San Ling","raw_affiliation_strings":["Division of Mathematical SciencesSchool of Physical & Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"],"raw_orcid":"https://orcid.org/0000-0002-1978-3557","affiliations":[{"raw_affiliation_string":"Division of Mathematical SciencesSchool of Physical & Mathematical Sciences, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090841998","display_name":"Huaxiong Wang","orcid":"https://orcid.org/0000-0002-7669-8922"},"institutions":[{"id":"https://openalex.org/I172675005","display_name":"Nanyang Technological University","ror":"https://ror.org/02e7b5302","country_code":"SG","type":"education","lineage":["https://openalex.org/I172675005"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Huaxiong Wang","raw_affiliation_strings":["Division of Mathematical SciencesSchool of Physical & Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Mathematical SciencesSchool of Physical & Mathematical Sciences, Nanyang Technological University, Singapore, Singapore","institution_ids":["https://openalex.org/I172675005"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100638898"],"corresponding_institution_ids":["https://openalex.org/I16764540"],"apc_list":null,"apc_paid":null,"fwci":8.3927,"has_fulltext":false,"cited_by_count":44,"citation_normalized_percentile":{"value":0.97562918,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"15","issue":"2","first_page":"357","last_page":"363"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7509205341339111},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6024602055549622},{"id":"https://openalex.org/keywords/multiplicative-function","display_name":"Multiplicative function","score":0.5920372009277344},{"id":"https://openalex.org/keywords/boolean-function","display_name":"Boolean function","score":0.5135946273803711},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5101478695869446},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4927678406238556},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4641163945198059},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4538203775882721},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.43339988589286804},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4301443099975586},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.43012726306915283},{"id":"https://openalex.org/keywords/generality","display_name":"Generality","score":0.4229603111743927},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.42051151394844055},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.41914311051368713},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.39353275299072266},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1083049476146698}],"concepts":[{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7509205341339111},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6024602055549622},{"id":"https://openalex.org/C42747912","wikidata":"https://www.wikidata.org/wiki/Q1048447","display_name":"Multiplicative function","level":2,"score":0.5920372009277344},{"id":"https://openalex.org/C187455244","wikidata":"https://www.wikidata.org/wiki/Q942353","display_name":"Boolean function","level":2,"score":0.5135946273803711},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5101478695869446},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4927678406238556},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4641163945198059},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4538203775882721},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.43339988589286804},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4301443099975586},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.43012726306915283},{"id":"https://openalex.org/C2780767217","wikidata":"https://www.wikidata.org/wiki/Q5532421","display_name":"Generality","level":2,"score":0.4229603111743927},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.42051151394844055},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.41914311051368713},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.39353275299072266},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1083049476146698},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tdsc.2016.2568182","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2568182","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},{"id":"pmh:oai:dr.ntu.edu.sg:10356/140106","is_oa":false,"landing_page_url":"https://hdl.handle.net/10356/140106","pdf_url":null,"source":{"id":"https://openalex.org/S4306402609","display_name":"DR-NTU (Nanyang Technological University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I172675005","host_organization_name":"Nanyang Technological University","host_organization_lineage":["https://openalex.org/I172675005"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G7213024625","display_name":null,"funder_award_id":"MOE2013-T2-1-041","funder_id":"https://openalex.org/F4320320751","funder_display_name":"Ministry of Education - Singapore"}],"funders":[{"id":"https://openalex.org/F4320320751","display_name":"Ministry of Education - Singapore","ror":"https://ror.org/01kcva023"},{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W17575016","https://openalex.org/W36213310","https://openalex.org/W116648389","https://openalex.org/W595442839","https://openalex.org/W1493098199","https://openalex.org/W1493307014","https://openalex.org/W1497981337","https://openalex.org/W1527798905","https://openalex.org/W1621599745","https://openalex.org/W1992282993","https://openalex.org/W2031533839","https://openalex.org/W2083705878","https://openalex.org/W2143087446","https://openalex.org/W2147929033","https://openalex.org/W2152926062","https://openalex.org/W2159915142","https://openalex.org/W2226167778","https://openalex.org/W2233194383","https://openalex.org/W2250570571","https://openalex.org/W2284068942","https://openalex.org/W2285574614","https://openalex.org/W2401959250","https://openalex.org/W4255390010","https://openalex.org/W6617954500","https://openalex.org/W6629431056","https://openalex.org/W6682311248"],"related_works":["https://openalex.org/W3028898974","https://openalex.org/W2384844478","https://openalex.org/W1755636270","https://openalex.org/W3192883662","https://openalex.org/W4386907889","https://openalex.org/W2912162584","https://openalex.org/W4388894064","https://openalex.org/W2095222155","https://openalex.org/W2886853612","https://openalex.org/W4281391121"],"abstract_inverted_index":{"Private":[0],"query":[1,165,242,316],"processing":[2],"is":[3,81,129,138,216,291,308,354],"a":[4,51,66,217,238,280,299,327,352],"very":[5],"attractive":[6],"problem":[7],"in":[8,140],"the":[9,24,28,75,78,85,91,103,115,143,154,160,169,172,179,198,209,222,230,252,258,275,349,359,374],"fields":[10],"of":[11,27,39,43,93,142,163,171,201,212,219,240,283,301,330,351,377],"both":[12],"cryptography":[13],"and":[14,54,195,247,295,298],"databases.":[15],"In":[16],"this":[17,55,98,127],"work,":[18],"we":[19,100,177,236,325,357],"restrict":[20],"our":[21,206,271,331],"attention":[22],"to":[23,82,114,147,205,321,364],"efficiency":[25,76,137],"aspect":[26],"problem,":[29],"particularly":[30],"for":[31,107,126,226,244,293,310],"basic":[32],"queries":[33,249],"with":[34,112,334,368],"conditions":[35,46,317],"on":[36,251,348],"various":[37],"combinations":[38],"equality.":[40],"Without":[41],"loss":[42],"generality,":[44],"these":[45],"can":[47,58],"be":[48,60,322],"regarded":[49],"as":[50,191],"Boolean":[52,56],"function,":[53],"function":[57,87],"then":[59],"evaluated":[61],"at":[62],"ciphertexts":[63,367],"produced":[64],"by":[65,119],"fully":[67],"homomorphic":[68],"encryption":[69],"(FHE)":[70],"scheme":[71,185,215],"without":[72,88],"decryption.":[73],"From":[74],"perspective,":[77],"remaining":[79],"concern":[80],"efficiently":[83],"test":[84,110,134,157,224,254,260],"equality":[86,109,133,156,223,253,259],"severely":[89],"downgrading":[90],"performance":[92,162,170],"FHE-based":[94,164],"querying":[95,272],"solutions.":[96],"To":[97],"end,":[99],"first":[101],"analyze":[102],"multiplicative":[104,144,180,232,281],"depth":[105,145,181,233,282,300,372],"required":[106,146,292,309],"an":[108,132,183,188,213,339],"algorithm":[111,158,225,261],"respect":[113],"plaintext":[116,193,210],"space":[117,194,211],"inhabited":[118],"general":[120],"FHE":[121,174,184,214],"schemes.":[122],"The":[123],"primary":[124],"reason":[125],"approach":[128],"that":[130,186,196],"given":[131],"algorithm,":[135],"its":[136,149,192],"measured":[139],"terms":[141],"construct":[148],"arithmetic":[150],"circuit":[151],"expression.":[152],"Indeed,":[153],"implemented":[155],"dominates":[159],"entire":[161],"solutions,":[166,332],"apart":[167],"from":[168,362],"underlying":[173],"scheme.":[175],"Then,":[176],"measure":[178],"considering":[182],"takes":[187],"extension":[189],"field":[190,218],"supports":[197],"depth-free":[199],"evaluation":[200],"Frobenius":[202],"maps.":[203],"According":[204],"analysis,":[207],"when":[208,314,338,373],"characteristic":[220],"2,":[221],"`-bit":[227],"messages":[228],"requires":[229],"lowest":[231],"dlog`e.":[234],"Furthermore,":[235],"design":[237],"set":[239],"private":[241],"protocols":[243,273],"conjunctive,":[245],"disjunctive,":[246],"threshold":[248,311],"based":[250],"algorithm.":[255],"Similarly,":[256],"applying":[257],"over":[262],"F":[263],"<sub":[264,267],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[265,268],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">2</sub>":[266],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">\u2113</sub>":[269],",":[270],"require":[274],"minimum":[276],"depths.":[277],"More":[278],"specifically,":[279],"[log":[284,287,302,369],"\u2113]":[285,303],"+":[286,289,304],"(1":[288],"\u03c1)]":[290],"conjunctive":[294,312],"disjunctive":[296],"queries,":[297,313],"2[log":[305],"(1+\u03c1":[306],")]":[307],"their":[315],"have":[318],"p":[319],"attributes":[320],"compared.":[323],"Finally,":[324],"provide":[326],"communication-efficient":[328],"version":[329],"though":[333],"additional":[335,371],"computational":[336],"costs,":[337],"upper":[340],"bound":[341],"\u03b4":[342,345],"(0":[343],"\u2264":[344,346],"1)":[347],"selectivity":[350],"database":[353,375],"given.":[355],"Consequently,":[356],"reduce":[358],"communication":[360],"cost":[361],"n":[363,378],"approximately":[365],"[\u03b4n]":[366],"n]":[370],"consists":[376],"tuples.":[379]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
