{"id":"https://openalex.org/W2487238101","doi":"https://doi.org/10.1109/tdsc.2016.2593444","title":"Searchable Encryption over Feature-Rich Data","display_name":"Searchable Encryption over Feature-Rich Data","publication_year":2016,"publication_date":"2016-07-20","ids":{"openalex":"https://openalex.org/W2487238101","doi":"https://doi.org/10.1109/tdsc.2016.2593444","mag":"2487238101"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2016.2593444","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2593444","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100391116","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0002-8967-8525"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Wang","raw_affiliation_strings":["State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087799859","display_name":"Meiqi He","orcid":null},"institutions":[{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Meiqi He","raw_affiliation_strings":["Department of Computer Science, The University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, The University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I889458895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083712477","display_name":"Minxin Du","orcid":"https://orcid.org/0000-0001-6620-6923"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Minxin Du","raw_affiliation_strings":["State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067752906","display_name":"Sherman S. M. Chow","orcid":"https://orcid.org/0000-0001-7306-453X"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sherman S. M. Chow","raw_affiliation_strings":["Department of Information Engineering, Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034642945","display_name":"Russell W. F. Lai","orcid":"https://orcid.org/0000-0001-9126-1887"},"institutions":[{"id":"https://openalex.org/I177725633","display_name":"Chinese University of Hong Kong","ror":"https://ror.org/00t33hh48","country_code":"CN","type":"education","lineage":["https://openalex.org/I177725633"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Russell W. F. Lai","raw_affiliation_strings":["Department of Information Engineering, Chinese University of Hong Kong, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, Chinese University of Hong Kong, Hong Kong","institution_ids":["https://openalex.org/I177725633"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070093927","display_name":"Qin Zou","orcid":"https://orcid.org/0000-0001-7955-0782"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qin Zou","raw_affiliation_strings":["State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China"],"affiliations":[{"raw_affiliation_string":"State Key Lab of Software Engineering, School of Computer Science, Wuhan University, Wuhan, Hubei, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100391116"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":30.4215,"has_fulltext":false,"cited_by_count":151,"citation_normalized_percentile":{"value":0.99624596,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"15","issue":"3","first_page":"496","last_page":"510"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10627","display_name":"Advanced Image and Video Retrieval Techniques","score":0.9926000237464905,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.963699996471405,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.837874710559845},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7405285239219666},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5959188342094421},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5681635737419128},{"id":"https://openalex.org/keywords/locality-sensitive-hashing","display_name":"Locality-sensitive hashing","score":0.5155039429664612},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5039083361625671},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4927819073200226},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.4813854992389679},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.464656263589859},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.4536265432834625},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3722016513347626},{"id":"https://openalex.org/keywords/hash-table","display_name":"Hash table","score":0.3711753487586975},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.1729062795639038},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.14134621620178223}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.837874710559845},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7405285239219666},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5959188342094421},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5681635737419128},{"id":"https://openalex.org/C74270461","wikidata":"https://www.wikidata.org/wiki/Q1625299","display_name":"Locality-sensitive hashing","level":4,"score":0.5155039429664612},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5039083361625671},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4927819073200226},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.4813854992389679},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.464656263589859},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.4536265432834625},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3722016513347626},{"id":"https://openalex.org/C67388219","wikidata":"https://www.wikidata.org/wiki/Q207440","display_name":"Hash table","level":3,"score":0.3711753487586975},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.1729062795639038},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.14134621620178223},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2016.2593444","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2016.2593444","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.41999998688697815}],"awards":[{"id":"https://openalex.org/G5396370005","display_name":null,"funder_award_id":"2014CB340600","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G6941188678","display_name":null,"funder_award_id":"61373167","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7701346152","display_name":null,"funder_award_id":"2042016kf0137","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1507830292","https://openalex.org/W1512194687","https://openalex.org/W1539859404","https://openalex.org/W1541459201","https://openalex.org/W1589843374","https://openalex.org/W1979493600","https://openalex.org/W2011798344","https://openalex.org/W2016575873","https://openalex.org/W2031476339","https://openalex.org/W2032127253","https://openalex.org/W2041480327","https://openalex.org/W2053826825","https://openalex.org/W2058301453","https://openalex.org/W2059447325","https://openalex.org/W2076043947","https://openalex.org/W2093175219","https://openalex.org/W2110889574","https://openalex.org/W2132172731","https://openalex.org/W2142040641","https://openalex.org/W2145426052","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2162006472","https://openalex.org/W2170037597","https://openalex.org/W2171790913","https://openalex.org/W2184702105","https://openalex.org/W2343161563","https://openalex.org/W2378756712","https://openalex.org/W2397770138","https://openalex.org/W4300349690","https://openalex.org/W6632397832","https://openalex.org/W6682311248","https://openalex.org/W6685012337","https://openalex.org/W6686482643"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2606354411","https://openalex.org/W2370014100","https://openalex.org/W3137108924","https://openalex.org/W1852009617","https://openalex.org/W4287264924","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W1979110442","https://openalex.org/W2144265691"],"abstract_inverted_index":{"Storage":[0],"services":[1],"allow":[2],"data":[3],"owners":[4],"to":[5,122,137],"store":[6],"their":[7],"huge":[8],"amount":[9],"of":[10,30,33,57,83,104,157,169,178],"potentially":[11],"sensitive":[12,119],"data,":[13,92],"such":[14],"as":[15,98],"audios,":[16],"images,":[17],"and":[18,52,70,130,145,164,190],"videos,":[19],"on":[20,49,54,111,160],"remote":[21],"cloud":[22],"servers":[23],"in":[24,148],"encrypted":[25,31,77,89],"form.":[26],"To":[27],"enable":[28],"retrieval":[29],"files":[32],"interest,":[34],"searchable":[35],"symmetric":[36],"encryption":[37],"(SSE)":[38],"schemes":[39,45,65,134],"have":[40,153],"been":[41],"proposed.":[42],"However,":[43],"many":[44],"construct":[46],"indexes":[47],"based":[48],"keyword-file":[50],"pairs":[51],"focus":[53],"boolean":[55],"expressions":[56],"exact":[58],"keyword":[59],"matches.":[60],"Moreover,":[61],"most":[62],"dynamic":[63],"SSE":[64],"cannot":[66],"achieve":[67],"forward":[68,146],"privacy":[69],"reveal":[71],"unnecessary":[72],"information":[73],"when":[74],"updating":[75],"the":[76,81,95,127,149,155],"databases.":[78],"We":[79,152],"tackle":[80],"challenge":[82],"supporting":[84],"large-scale":[85],"similarity":[86],"search":[87,96,167],"over":[88],"feature-rich":[90],"multimedia":[91],"by":[93],"considering":[94],"criteria":[97],"a":[99,105,166,175],"high-dimensional":[100,162],"feature":[101,131],"vector":[102],"instead":[103],"keyword.":[106],"Our":[107,133],"solutions":[108],"are":[109,135],"built":[110],"carefully-designed":[112],"fuzzy":[113],"Bloom":[114],"filters":[115],"which":[116],"utilize":[117],"locality":[118],"hashing":[120],"(LSH)":[121],"encode":[123],"an":[124],"index":[125,187],"associating":[126],"file":[128],"identifiers":[129],"vectors.":[132],"proven":[136],"be":[138],"secure":[139],"against":[140],"adaptively":[141],"chosen":[142],"query":[143],"attack":[144],"private":[147],"standard":[150],"model.":[151],"evaluated":[154],"performance":[156],"our":[158,186],"scheme":[159],"real-world":[161],"datasets,":[163],"achieved":[165],"quality":[168],"99":[170],"percent":[171],"recall":[172],"with":[173],"only":[174,194],"few":[176],"number":[177],"hash":[179],"tables":[180],"for":[181],"LSH.":[182],"This":[183],"shows":[184],"that":[185],"is":[188,192],"compact":[189],"searching":[191],"not":[193],"efficient":[195],"but":[196],"also":[197],"accurate.":[198]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":9},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":18},{"year":2020,"cited_by_count":25},{"year":2019,"cited_by_count":25},{"year":2018,"cited_by_count":23},{"year":2017,"cited_by_count":18},{"year":2016,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
