{"id":"https://openalex.org/W4392908482","doi":"https://doi.org/10.1109/tdsc.2024.3376084","title":"Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data","display_name":"Achieving Practical and Privacy-Preserving kNN Query Over Encrypted Data","publication_year":2024,"publication_date":"2024-03-18","ids":{"openalex":"https://openalex.org/W4392908482","doi":"https://doi.org/10.1109/tdsc.2024.3376084"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3376084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3376084","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5091898557","display_name":"Yandong Zheng","orcid":"https://orcid.org/0000-0003-4534-5670"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yandong Zheng","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070447777","display_name":"Rongxing Lu","orcid":"https://orcid.org/0000-0001-5720-0941"},"institutions":[{"id":"https://openalex.org/I106938459","display_name":"University of New Brunswick","ror":"https://ror.org/05nkf0n29","country_code":"CA","type":"education","lineage":["https://openalex.org/I106938459"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Rongxing Lu","raw_affiliation_strings":["Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Science, University of New Brunswick, Fredericton, NB, Canada","institution_ids":["https://openalex.org/I106938459"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086477266","display_name":"Songnian Zhang","orcid":"https://orcid.org/0000-0002-0558-4485"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Songnian Zhang","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040489898","display_name":"Jun Shao","orcid":"https://orcid.org/0000-0001-8352-0973"},"institutions":[{"id":"https://openalex.org/I75059550","display_name":"Zhejiang Gongshang University","ror":"https://ror.org/0569mkk41","country_code":"CN","type":"education","lineage":["https://openalex.org/I75059550"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Shao","raw_affiliation_strings":["School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou, China","institution_ids":["https://openalex.org/I75059550"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5021292791","display_name":"Hui Zhu","orcid":"https://orcid.org/0000-0002-5853-633X"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hui Zhu","raw_affiliation_strings":["State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Integrated Services Networks, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5091898557"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":4.1451,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.94428469,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"21","issue":"6","first_page":"5479","last_page":"5492"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8299907445907593},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6404283046722412},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.528306245803833},{"id":"https://openalex.org/keywords/query-optimization","display_name":"Query optimization","score":0.42068931460380554},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3792807161808014},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2973683178424835}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8299907445907593},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6404283046722412},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.528306245803833},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.42068931460380554},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3792807161808014},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2973683178424835}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3376084","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3376084","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1014302991","display_name":null,"funder_award_id":"62302374","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6894247995","display_name":null,"funder_award_id":"2022M722498","funder_id":"https://openalex.org/F4320321543","funder_display_name":"China Postdoctoral Science Foundation"},{"id":"https://openalex.org/G8104162393","display_name":null,"funder_award_id":"62272413","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320321543","display_name":"China Postdoctoral Science Foundation","ror":"https://ror.org/0426zh255"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W2030888439","https://openalex.org/W2041480327","https://openalex.org/W2051847955","https://openalex.org/W2056609765","https://openalex.org/W2063695313","https://openalex.org/W2067636847","https://openalex.org/W2074356711","https://openalex.org/W2115016714","https://openalex.org/W2132172731","https://openalex.org/W2157855380","https://openalex.org/W2158112071","https://openalex.org/W2162511804","https://openalex.org/W2163992091","https://openalex.org/W2734883239","https://openalex.org/W2884345292","https://openalex.org/W2891871515","https://openalex.org/W2897276997","https://openalex.org/W2923059398","https://openalex.org/W2948987039","https://openalex.org/W2951490592","https://openalex.org/W3000968708","https://openalex.org/W3014422368","https://openalex.org/W3030680930","https://openalex.org/W3031884657","https://openalex.org/W3152310729"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857","https://openalex.org/W2350741829","https://openalex.org/W2530322880"],"abstract_inverted_index":{"As":[0],"one":[1],"of":[2,46,139,247],"the":[3,11,44,47,58,61,71,75,98,107,137,160,188,193,229,278],"most":[4],"popular":[5],"queries":[6],"in":[7,29,128,167,220,243],"big":[8],"data":[9,93,102,116],"era,":[10],"<inline-formula":[12,19,63,108,177,236,249],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[13,20,64,109,178,237,250],"xmlns:xlink=\"http://www.w3.org/1999/xlink\"><tex-math":[14,21,65,110,179,238,251],"notation=\"LaTeX\">$k$</tex-math></inline-formula>":[15,22,66,111,180,239,252],"nearest":[16],"neighbors":[17],"(":[18],"NN)":[23],"query":[24,68,113,142,148,152,182,241,257],"plays":[25],"a":[26,172,204,221,234,245],"significant":[27],"role":[28],"various":[30],"applications,":[31],"such":[32],"as":[33,74],"medical":[34],"diagnosis,":[35],"signal":[36],"processing,":[37],"and":[38,60,88,121,147,154,175,216,223,277],"recommendation":[39],"systems.":[40],"Meanwhile,":[41],"driven":[42],"by":[43,196],"advancement":[45],"cloud":[48,76],"service,":[49],"an":[50],"emerging":[51],"trend":[52],"among":[53],"applications":[54,82],"is":[55,77,253,267,285],"to":[56,70,97,105,210,255],"outsource":[57],"dataset":[59],"corresponding":[62],"NN":[67,112,181,240],"services":[69],"cloud.":[72,99],"However,":[73,131],"not":[78],"fully":[79,135],"trusted,":[80],"those":[81],"will":[83],"face":[84],"vital":[85],"privacy":[86,146],"concerns,":[87],"thus":[89],"they":[90],"usually":[91],"encrypt":[92],"before":[94],"outsourcing":[95],"them":[96],"Because":[100],"encrypted":[101,115],"are":[103,275],"outsourced":[104],"cloud,":[106],"over":[114],"has":[117],"become":[118],"increasingly":[119],"attractive,":[120],"many":[122],"solutions":[123,133],"have":[124],"been":[125],"put":[126],"forth":[127],"recent":[129],"years.":[130],"existing":[132,199],"cannot":[134],"satisfy":[136],"objects":[138],"returning":[140],"exact":[141],"results,":[143],"protecting":[144],"database":[145],"privacy,":[149],"achieving":[150],"high":[151],"efficiency,":[153],"imposing":[155],"low":[156],"computational":[157],"costs":[158],"at":[159],"user":[161],"side.":[162],"To":[163],"address":[164],"these":[165],"issues,":[166],"this":[168],"paper,":[169],"we":[170,185,202,232],"propose":[171,233],"new":[173],"practical":[174],"privacy-preserving":[176,235],"scheme.":[183],"Specifically,":[184],"first":[186],"refine":[187],"general":[189],"security":[190,260],"requirements":[191],"for":[192],"matrix":[194,207],"encryption":[195,208],"systematically":[197],"analyzing":[198],"algorithms.":[200],"Then,":[201,226],"design":[203],"novel":[205],"asymmetric":[206],"(AME)":[209],"securely":[211],"achieve":[212],"Euclidean":[213],"distance":[214],"computation":[215],"two":[217],"distances":[218],"comparison":[219],"single-party":[222],"non-interactive":[224],"way.":[225],"based":[227],"on":[228],"AME":[230],"scheme,":[231,242],"which":[244],"max-heap":[246],"size":[248],"used":[254],"accelerate":[256],"efficiency.":[258],"Detailed":[259],"analysis":[261],"shows":[262],"that":[263,281],"our":[264,282],"proposed":[265,283],"scheme":[266,284],"really":[268],"privacy-preserving.":[269],"In":[270],"addition,":[271],"extensive":[272],"performance":[273],"evaluations":[274],"conducted,":[276],"results":[279],"demonstrate":[280],"also":[286],"highly":[287],"efficient.":[288]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
