{"id":"https://openalex.org/W4415593541","doi":"https://doi.org/10.1109/tdsc.2025.3625560","title":"AuthGraph: Authorized Search Over Encrypted Social Graph Database With Trusted Hardware","display_name":"AuthGraph: Authorized Search Over Encrypted Social Graph Database With Trusted Hardware","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W4415593541","doi":"https://doi.org/10.1109/tdsc.2025.3625560"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3625560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3625560","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029376715","display_name":"Jiawen Wu","orcid":"https://orcid.org/0009-0001-1334-1141"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiawen Wu","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"raw_orcid":"https://orcid.org/0009-0001-1334-1141","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yifan Xu","orcid":"https://orcid.org/0009-0005-8864-068X"},"institutions":[{"id":"https://openalex.org/I129604602","display_name":"The University of Sydney","ror":"https://ror.org/0384j8v12","country_code":"AU","type":"education","lineage":["https://openalex.org/I129604602"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Yifan Xu","raw_affiliation_strings":["School of Computer Science, University of Sydney, Sydney, NSW, Australia","School of Computer Science, University of Sydney, Sydney, Australia"],"raw_orcid":"https://orcid.org/0009-0005-8864-068X","affiliations":[{"raw_affiliation_string":"School of Computer Science, University of Sydney, Sydney, NSW, Australia","institution_ids":["https://openalex.org/I129604602"]},{"raw_affiliation_string":"School of Computer Science, University of Sydney, Sydney, Australia","institution_ids":["https://openalex.org/I129604602"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kai Zhang","orcid":"https://orcid.org/0000-0001-9728-4051"},"institutions":[{"id":"https://openalex.org/I23632641","display_name":"Shanghai University of Electric Power","ror":"https://ror.org/02w4tny03","country_code":"CN","type":"education","lineage":["https://openalex.org/I23632641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Zhang","raw_affiliation_strings":["College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China"],"raw_orcid":"https://orcid.org/0000-0001-9728-4051","affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Shanghai University of Electric Power, Shanghai, China","institution_ids":["https://openalex.org/I23632641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030109120","display_name":"Pengfei Wu","orcid":"https://orcid.org/0000-0003-0896-9476"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Pengfei Wu","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-0896-9476","affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Singapore","institution_ids":["https://openalex.org/I79891267"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yuling Chen","orcid":"https://orcid.org/0000-0002-8674-8356"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuling Chen","raw_affiliation_strings":["State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China"],"raw_orcid":"https://orcid.org/0000-0002-8674-8356","affiliations":[{"raw_affiliation_string":"State Key Laboratory of Public Big Data, College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"State Key Laboratory of Public Big Data and the College of Computer Science and Technology, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081596329","display_name":"Jianting Ning","orcid":"https://orcid.org/0000-0001-7165-398X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianting Ning","raw_affiliation_strings":["School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0001-7165-398X","affiliations":[{"raw_affiliation_string":"School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5029376715"],"corresponding_institution_ids":["https://openalex.org/I23632641"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15740071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"2242","last_page":"2256"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9908000230789185,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6757000088691711},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5874999761581421},{"id":"https://openalex.org/keywords/social-graph","display_name":"Social graph","score":0.5519000291824341},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4629000127315521},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.43309998512268066},{"id":"https://openalex.org/keywords/delegation","display_name":"Delegation","score":0.42649999260902405},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4120999872684479},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.3928999900817871}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8565999865531921},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6757000088691711},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5874999761581421},{"id":"https://openalex.org/C2777522414","wikidata":"https://www.wikidata.org/wiki/Q648457","display_name":"Social graph","level":3,"score":0.5519000291824341},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47909998893737793},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4629000127315521},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.43309998512268066},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.42649999260902405},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4120999872684479},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.3928999900817871},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3865000009536743},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.3864000141620636},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.37220001220703125},{"id":"https://openalex.org/C65647387","wikidata":"https://www.wikidata.org/wiki/Q1781706","display_name":"Conjunctive query","level":3,"score":0.37209999561309814},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.32919999957084656},{"id":"https://openalex.org/C176225458","wikidata":"https://www.wikidata.org/wiki/Q595971","display_name":"Graph database","level":3,"score":0.32010000944137573},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.3192000091075897},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.31839999556541443},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2980000078678131},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.29159998893737793},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.29120001196861267},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2847999930381775},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.26899999380111694}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3625560","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3625560","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1611947856","display_name":null,"funder_award_id":"62372285","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G1779290825","display_name":null,"funder_award_id":"12441101","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6112228076","display_name":null,"funder_award_id":"U24A20241","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1963071371","https://openalex.org/W2108072891","https://openalex.org/W2134079148","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2162538292","https://openalex.org/W2765463836","https://openalex.org/W2783466287","https://openalex.org/W2944600096","https://openalex.org/W2991364609","https://openalex.org/W3002682074","https://openalex.org/W3005805302","https://openalex.org/W3008509668","https://openalex.org/W3012623189","https://openalex.org/W3094168455","https://openalex.org/W3094504436","https://openalex.org/W3128530640","https://openalex.org/W3167780976","https://openalex.org/W3175095614","https://openalex.org/W3176059584","https://openalex.org/W3194778053","https://openalex.org/W3197816674","https://openalex.org/W3198846159","https://openalex.org/W3209153114","https://openalex.org/W3214260160","https://openalex.org/W4205662536","https://openalex.org/W4225654613","https://openalex.org/W4288057728","https://openalex.org/W4292970446","https://openalex.org/W4321021982","https://openalex.org/W4381946520","https://openalex.org/W4388125273","https://openalex.org/W4391725264","https://openalex.org/W4400121239","https://openalex.org/W4403792287","https://openalex.org/W4404213242","https://openalex.org/W4411086162","https://openalex.org/W4411337770"],"related_works":[],"abstract_inverted_index":{"Privacy-preserving":[0],"social":[1,10,29,57,84,136,186],"graph":[2,58,137],"search":[3,59,131,202],"allows":[4],"the":[5,31,65,161,177,193],"retrieval":[6],"of":[7,164,179],"relationships":[8,26],"within":[9],"networks":[11],"while":[12,86,171],"not":[13],"com":[14],"promising":[15],"individuals'":[16],"private":[17],"information.":[18],"Although":[19],"numerous":[20],"solutions":[21],"enable":[22],"conjunctive":[23,56,93,130],"queries":[24,94],"for":[25,81,109,123],"on":[27,184,189,201],"encrypted":[28],"networks,":[30],"multi-client":[32,66],"model":[33,104],"is":[34],"neglected":[35],"despite":[36],"its":[37],"crucial":[38],"role":[39],"in":[40,64,159],"collaborative":[41],"data":[42,74],"sharing,":[43],"and":[44,55,116,151],"personalized":[45],"recommendations.":[46],"In":[47,71],"this":[48],"paper,":[49],"we":[50,175],"present":[51],"AuthGraph,":[52,72,160],"a":[53,73,102,112,127,134],"privacy-preserving":[54],"system":[60,132,169],"with":[61,105],"trusted":[62,165],"hardware":[63,166],"(i.e.,":[67],"multi-writer/multi":[68],"reader)":[69],"model.":[70],"owner":[75],"delegates":[76],"update":[77],"rights":[78],"to":[79,90,120],"writers":[80,110],"maintaining":[82,172],"dynamic":[83,135,142],"relationships,":[85],"readers":[87],"are":[88],"allowed":[89],"perform":[91],"edge-weighted":[92],"via":[95,111,146],"writer-enforced":[96],"access":[97,106,196],"policy.":[98],"Technically,":[99],"AuthGraph":[100,139,180],"builds":[101],"multi-writer/multi-reader":[103],"control":[107],"delegation":[108],"set-constrained":[113],"pseudo-random":[114],"function,":[115],"uses":[117],"attribute-based":[118],"encryption":[119],"configure":[121],"authorizations":[122],"readers.":[124],"To":[125],"give":[126],"provably":[128],"secure":[129],"over":[133],"database,":[138],"revisits":[140],"oblivious":[141],"cross":[143],"tag":[144],"protocol":[145],"providing":[147],"comprehensive":[148],"forward":[149],"privacy":[150],"Type-O":[152],"backward":[153],"privacy.":[154],"Different":[155],"from":[156],"previous":[157],"solutions,":[158],"semi-black-box":[162],"deployment":[163],"effectively":[167],"ensures":[168],"security":[170],"performance.":[173],"Finally,":[174],"demonstrate":[176],"performance":[178],"through":[181],"extensive":[182],"experiments":[183],"real":[185],"network":[187],"datasets":[188],"AliCloud,":[190],"revealing":[191],"that":[192],"writer":[194],"enforced":[195],"policy":[197],"has":[198],"minimal":[199],"impact":[200],"time":[203],"cost.":[204]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-28T00:00:00"}
