{"id":"https://openalex.org/W4411336549","doi":"https://doi.org/10.1109/tdsc.2025.3580140","title":"Enabling Efficient and Privacy-Preserving Sequence Similarity Query on Encrypted Genomes","display_name":"Enabling Efficient and Privacy-Preserving Sequence Similarity Query on Encrypted Genomes","publication_year":2025,"publication_date":"2025-06-16","ids":{"openalex":"https://openalex.org/W4411336549","doi":"https://doi.org/10.1109/tdsc.2025.3580140"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2025.3580140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3580140","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042827224","display_name":"Chen Gong","orcid":"https://orcid.org/0000-0002-9388-1171"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chen Gong","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5044015155","display_name":"Xiangyu Wang","orcid":"https://orcid.org/0000-0002-6420-8308"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangyu Wang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101978791","display_name":"Dan Zhu","orcid":"https://orcid.org/0000-0002-3365-6757"},"institutions":[{"id":"https://openalex.org/I17145004","display_name":"Northwestern Polytechnical University","ror":"https://ror.org/01y0j0j86","country_code":"CN","type":"education","lineage":["https://openalex.org/I17145004"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dan Zhu","raw_affiliation_strings":["School of Cyber Security, Northwestern Polytechnical University, Xi&#x2019;an, China","School of Cyber Security, Northwestern Polytechnical University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security, Northwestern Polytechnical University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I17145004"]},{"raw_affiliation_string":"School of Cyber Security, Northwestern Polytechnical University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I17145004"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038498019","display_name":"Cheng Huang","orcid":"https://orcid.org/0000-0003-3769-7211"},"institutions":[{"id":"https://openalex.org/I24943067","display_name":"Fudan University","ror":"https://ror.org/013q1eq08","country_code":"CN","type":"education","lineage":["https://openalex.org/I24943067"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Cheng Huang","raw_affiliation_strings":["School of Computer Science, Fudan University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Fudan University, Shanghai, China","institution_ids":["https://openalex.org/I24943067"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056761518","display_name":"Zhuoran Ma","orcid":"https://orcid.org/0000-0002-9476-6386"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhuoran Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","School of Cyber Engineering, Xidian University, Xi&#x0027;an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi&#x0027;an, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5042827224"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.07340271,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"6","first_page":"6058","last_page":"6073"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11269","display_name":"Algorithms and Data Compression","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12029","display_name":"DNA and Biological Computing","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1312","display_name":"Molecular Biology"},"field":{"id":"https://openalex.org/fields/13","display_name":"Biochemistry, Genetics and Molecular Biology"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12162","display_name":"Cellular Automata and Applications","score":0.9429000020027161,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8179605007171631},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7225272059440613},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.5502859354019165},{"id":"https://openalex.org/keywords/similarity","display_name":"Similarity (geometry)","score":0.4993875026702881},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4564592242240906},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4514554440975189},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.38932615518569946},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.335543692111969},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20460918545722961},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17020970582962036},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.12062713503837585}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8179605007171631},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7225272059440613},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.5502859354019165},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.4993875026702881},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4564592242240906},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4514554440975189},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.38932615518569946},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.335543692111969},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20460918545722961},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17020970582962036},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.12062713503837585},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C54355233","wikidata":"https://www.wikidata.org/wiki/Q7162","display_name":"Genetics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3580140","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3580140","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":43,"referenced_works":["https://openalex.org/W1480988843","https://openalex.org/W1994529543","https://openalex.org/W2005991258","https://openalex.org/W2012010763","https://openalex.org/W2087135382","https://openalex.org/W2093175219","https://openalex.org/W2098622176","https://openalex.org/W2117740674","https://openalex.org/W2122590785","https://openalex.org/W2131772137","https://openalex.org/W2132257180","https://openalex.org/W2136068515","https://openalex.org/W2235087147","https://openalex.org/W2595351638","https://openalex.org/W2596199572","https://openalex.org/W2745343546","https://openalex.org/W2762497841","https://openalex.org/W2762638728","https://openalex.org/W2785694006","https://openalex.org/W2792809817","https://openalex.org/W2793130752","https://openalex.org/W2805670944","https://openalex.org/W2889349423","https://openalex.org/W2900798344","https://openalex.org/W2956528105","https://openalex.org/W2962888775","https://openalex.org/W2963839334","https://openalex.org/W2978740330","https://openalex.org/W2995799768","https://openalex.org/W3002779531","https://openalex.org/W3156528756","https://openalex.org/W3163561067","https://openalex.org/W3216908060","https://openalex.org/W4205974944","https://openalex.org/W4295308511","https://openalex.org/W4324007139","https://openalex.org/W4352977396","https://openalex.org/W4365128449","https://openalex.org/W4387321622","https://openalex.org/W4390660175","https://openalex.org/W4392902703","https://openalex.org/W4394627293","https://openalex.org/W4406858640"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W4205163163"],"abstract_inverted_index":{"Over":[0],"the":[1,45,98],"past":[2],"decades,":[3],"Sequence":[4],"Similarity":[5],"Query":[6],"(SSQ)":[7],"has":[8],"been":[9,20],"widely":[10],"used":[11],"in":[12],"genomic":[13,25,55,81,112,123],"analysis.":[14],"Several":[15],"privacy-preserving":[16,119],"SSQ":[17,40,72,76,120],"schemes":[18],"have":[19],"proposed":[21],"to":[22,29,43,66,151],"protect":[23],"sensitive":[24],"data":[26,124],"but":[27],"struggle":[28],"balance":[30],"security":[31],"and":[32,62,74,100],"efficiency.":[33],"This":[34],"paper":[35],"proposes":[36],"a":[37,87,142],"Privacy-preserving":[38],"Genomic":[39,92],"(PGSSQ)":[41],"scheme":[42],"address":[44],"above":[46],"issue.":[47],"Specifically,":[48],"we":[49,85],"first":[50],"design":[51],"two":[52],"fundamental":[53],"privacypreserving":[54],"matching":[56],"methods,":[57],"Edit-distance":[58],"Threshold":[59],"Match":[60,64],"(ETM)":[61],"Dual-Threshold":[63],"(DTM),":[65],"support":[67],"approximate":[68],"editdistance":[69],"based":[70,96],"threshold":[71],"matches":[73,77],"range-constrained":[75],"on":[78,97,121,141],"encrypted":[79,115,122],"high-dimensional":[80],"sequences,":[82],"respectively.":[83],"Then,":[84],"present":[86],"genetic":[88],"index":[89],"structure":[90],"called":[91],"Evaluation":[93],"Tree":[94],"(GE-Tree)":[95],"ETM":[99],"DTM.":[101],"GE-Tree":[102],"enables":[103],"dynamic":[104],"pruning":[105],"of":[106],"query":[107],"paths":[108],"without":[109],"disclosing":[110],"any":[111],"information":[113],"from":[114],"nodes,":[116],"thereby":[117],"supporting":[118],"with":[125],"sublinear":[126],"computational":[127],"complexity.":[128],"Security":[129],"analysis":[130],"proves":[131],"that":[132,146],"PGSSQ":[133,147],"is":[134,148],"secure":[135],"under":[136],"selective":[137],"chosenplaintext":[138],"attacks.":[139],"Experiments":[140],"real-world":[143],"dataset":[144],"show":[145],"efficient":[149],"compared":[150],"state-of-the-art":[152],"schemes.":[153]},"counts_by_year":[],"updated_date":"2025-11-14T23:14:49.485078","created_date":"2025-10-10T00:00:00"}
