{"id":"https://openalex.org/W4405520332","doi":"https://doi.org/10.1109/tdsc.2024.3519584","title":"Forward Secure Similarity Search Over Encrypted Data for Hamming Distance","display_name":"Forward Secure Similarity Search Over Encrypted Data for Hamming Distance","publication_year":2024,"publication_date":"2024-12-18","ids":{"openalex":"https://openalex.org/W4405520332","doi":"https://doi.org/10.1109/tdsc.2024.3519584"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2024.3519584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3519584","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038485076","display_name":"Beining Wang","orcid":"https://orcid.org/0009-0000-7652-719X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Beining Wang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004999865","display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yingying Huang","orcid":"https://orcid.org/0009-0003-3396-165X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yingying Huang","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100394917","display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054435331","display_name":"Chenbin Zhao","orcid":"https://orcid.org/0000-0002-2390-7153"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenbin Zhao","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100529319","display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5038485076"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.3415,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69280344,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"22","issue":"3","first_page":"2478","last_page":"2491"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9595999717712402,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9200000166893005,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.8625679016113281},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7106690406799316},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6684591770172119},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.5665382742881775},{"id":"https://openalex.org/keywords/edit-distance","display_name":"Edit distance","score":0.5179828405380249},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.504330039024353},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2844822406768799},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.21659481525421143},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.195715069770813}],"concepts":[{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.8625679016113281},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7106690406799316},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6684591770172119},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.5665382742881775},{"id":"https://openalex.org/C44359876","wikidata":"https://www.wikidata.org/wiki/Q5338467","display_name":"Edit distance","level":2,"score":0.5179828405380249},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.504330039024353},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2844822406768799},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.21659481525421143},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.195715069770813},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2024.3519584","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2024.3519584","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G782110378","display_name":null,"funder_award_id":"62172303","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7960939272","display_name":null,"funder_award_id":"62076187","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W2016575873","https://openalex.org/W2032127253","https://openalex.org/W2041480327","https://openalex.org/W2044340178","https://openalex.org/W2093175219","https://openalex.org/W2117740674","https://openalex.org/W2122590785","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2233400177","https://openalex.org/W2490265015","https://openalex.org/W2765463836","https://openalex.org/W2766270866","https://openalex.org/W2766707306","https://openalex.org/W2949763173","https://openalex.org/W2962888775","https://openalex.org/W2983840326","https://openalex.org/W3008291567","https://openalex.org/W3091517985","https://openalex.org/W3094474718","https://openalex.org/W3112250879","https://openalex.org/W3174463538","https://openalex.org/W4205131925","https://openalex.org/W4205547493","https://openalex.org/W4281391178","https://openalex.org/W4296437242","https://openalex.org/W4315630921","https://openalex.org/W6720239471","https://openalex.org/W6754867846"],"related_works":["https://openalex.org/W1494289317","https://openalex.org/W1531307672","https://openalex.org/W2611868502","https://openalex.org/W2180288160","https://openalex.org/W2165259681","https://openalex.org/W2416529140","https://openalex.org/W162676011","https://openalex.org/W2612888708","https://openalex.org/W2888987343","https://openalex.org/W2140783370"],"abstract_inverted_index":{"Similarity":[0],"search":[1,45,101],"on":[2,91],"encrypted":[3,103],"data":[4,8,104],"can":[5],"identify":[6],"similar":[7],"and":[9,17,113,136,146],"handle":[10],"misspelled":[11],"keywords":[12,82],"in":[13,60],"a":[14,21,69,84,96],"privacy-preserving":[15],"manner":[16],"thus":[18],"has":[19],"received":[20],"lot":[22],"of":[23,133,149],"attention.":[24],"However,":[25],"existing":[26],"schemes":[27,49,128],"suffer":[28],"from":[29],"imprecise":[30],"or":[31,56],"predefined":[32],"distance":[33,80,111],"thresholds,":[34],"which":[35],"means":[36],"that":[37,75,107,119,126],"they":[38],"do":[39,51],"not":[40,52],"always":[41],"return":[42],"the":[43,78,131,144],"expected":[44],"results.":[46],"Moreover,":[47],"these":[48],"either":[50],"consider":[53],"document":[54],"addition":[55],"lack":[57],"forward":[58,121],"security":[59],"this":[61,65],"dynamic":[62],"setting.":[63],"In":[64],"article,":[66],"we":[67,94],"present":[68],"Similar":[70],"Keyword":[71],"Matching":[72],"(SKM)":[73],"framework":[74],"accurately":[76],"calculates":[77],"Hamming":[79,110],"between":[81],"through":[83],"new":[85],"keyword":[86],"representation":[87],"called":[88,105,117],"uni-pos-gram.":[89],"Based":[90],"our":[92,127,150],"framework,":[93],"propose":[95],"basic":[97],"scheme":[98,116],"for":[99],"similarity":[100],"over":[102],"SimSE":[106],"offers":[108],"adjustable":[109],"thresholds":[112],"an":[114],"enhanced":[115],"SimSE-F":[118],"provides":[120],"security.":[122],"Security":[123],"analysis":[124],"demonstrates":[125],"effectively":[129],"safeguard":[130],"privacy":[132],"documents,":[134],"indexes,":[135],"searches.":[137],"Empirical":[138],"experiments":[139],"using":[140],"real-world":[141],"datasets":[142],"demonstrate":[143],"efficiency":[145],"practical":[147],"applicability":[148],"schemes.":[151]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
