{"id":"https://openalex.org/W7115173964","doi":"https://doi.org/10.1109/tdsc.2025.3644654","title":"Fully Private Shortest Path Computation With Single-Round Interaction","display_name":"Fully Private Shortest Path Computation With Single-Round Interaction","publication_year":2025,"publication_date":"2025-12-15","ids":{"openalex":"https://openalex.org/W7115173964","doi":"https://doi.org/10.1109/tdsc.2025.3644654"},"language":null,"primary_location":{"id":"doi:10.1109/tdsc.2025.3644654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3644654","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Jing Chen","orcid":"https://orcid.org/0000-0002-7212-5297"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jing Chen","raw_affiliation_strings":["Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ruifeng Zhu","orcid":"https://orcid.org/0009-0005-7039-6586"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruifeng Zhu","raw_affiliation_strings":["Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Kun He","orcid":"https://orcid.org/0000-0003-3472-419X"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kun He","raw_affiliation_strings":["Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Chenbin Zhao","orcid":"https://orcid.org/0000-0002-2390-7153"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chenbin Zhao","raw_affiliation_strings":["Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Meng Jia","orcid":"https://orcid.org/0000-0003-3623-3490"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Jia","raw_affiliation_strings":["Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":null,"display_name":"Ruiying Du","orcid":"https://orcid.org/0000-0002-3634-3385"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruiying Du","raw_affiliation_strings":["Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Laboratory of Aerospace Information Security and Trusted Computing, School of Cyber Science and Engineering, Wuhan University, Ministry of Education, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80586014,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":"2","first_page":"4208","last_page":"4220"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.388700008392334,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.388700008392334,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.3425000011920929,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.09570000320672989,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/shortest-path-problem","display_name":"Shortest path problem","score":0.7856000065803528},{"id":"https://openalex.org/keywords/k-shortest-path-routing","display_name":"K shortest path routing","score":0.6410999894142151},{"id":"https://openalex.org/keywords/constrained-shortest-path-first","display_name":"Constrained Shortest Path First","score":0.5486999750137329},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.5005000233650208},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4555000066757202},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.44769999384880066},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.43320000171661377},{"id":"https://openalex.org/keywords/private-network-to-network-interface","display_name":"Private Network-to-Network Interface","score":0.42989999055862427},{"id":"https://openalex.org/keywords/path","display_name":"Path (computing)","score":0.4205999970436096}],"concepts":[{"id":"https://openalex.org/C22590252","wikidata":"https://www.wikidata.org/wiki/Q1058754","display_name":"Shortest path problem","level":3,"score":0.7856000065803528},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7849000096321106},{"id":"https://openalex.org/C70266271","wikidata":"https://www.wikidata.org/wiki/Q6343044","display_name":"K shortest path routing","level":4,"score":0.6410999894142151},{"id":"https://openalex.org/C178067994","wikidata":"https://www.wikidata.org/wiki/Q1128278","display_name":"Constrained Shortest Path First","level":5,"score":0.5486999750137329},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5067999958992004},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.5005000233650208},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4555000066757202},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.44769999384880066},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.43320000171661377},{"id":"https://openalex.org/C204348804","wikidata":"https://www.wikidata.org/wiki/Q3888133","display_name":"Private Network-to-Network Interface","level":5,"score":0.42989999055862427},{"id":"https://openalex.org/C2777735758","wikidata":"https://www.wikidata.org/wiki/Q817765","display_name":"Path (computing)","level":2,"score":0.4205999970436096},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.39890000224113464},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3756999969482422},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.3725999891757965},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.36579999327659607},{"id":"https://openalex.org/C168451585","wikidata":"https://www.wikidata.org/wiki/Q7502159","display_name":"Shortest Path Faster Algorithm","level":5,"score":0.35179999470710754},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3416000008583069},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3361999988555908},{"id":"https://openalex.org/C2777622855","wikidata":"https://www.wikidata.org/wiki/Q7901844","display_name":"User information","level":3,"score":0.3082999885082245},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.2870999872684479},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C1465435","wikidata":"https://www.wikidata.org/wiki/Q2916352","display_name":"Longest path problem","level":4,"score":0.2635999917984009},{"id":"https://openalex.org/C170836113","wikidata":"https://www.wikidata.org/wiki/Q5406126","display_name":"Euclidean shortest path","level":5,"score":0.2621000111103058},{"id":"https://openalex.org/C3017597292","wikidata":"https://www.wikidata.org/wiki/Q25052250","display_name":"Privacy protection","level":2,"score":0.25859999656677246},{"id":"https://openalex.org/C91886571","wikidata":"https://www.wikidata.org/wiki/Q432520","display_name":"Average path length","level":4,"score":0.2572000026702881}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2025.3644654","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2025.3644654","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1755636270","https://openalex.org/W2017464959","https://openalex.org/W2073346043","https://openalex.org/W2075710877","https://openalex.org/W2126425936","https://openalex.org/W2132172731","https://openalex.org/W2150307013","https://openalex.org/W2169528473","https://openalex.org/W2237491325","https://openalex.org/W2397857137","https://openalex.org/W2463730913","https://openalex.org/W2511693736","https://openalex.org/W2782618027","https://openalex.org/W2809452802","https://openalex.org/W2883089683","https://openalex.org/W2909935011","https://openalex.org/W2942255051","https://openalex.org/W2961820194","https://openalex.org/W2985716091","https://openalex.org/W3021297992","https://openalex.org/W3052413922","https://openalex.org/W3120370876","https://openalex.org/W3157087073","https://openalex.org/W3181179481","https://openalex.org/W3207689161","https://openalex.org/W3213220428","https://openalex.org/W4285263363","https://openalex.org/W4308641900","https://openalex.org/W4313124429","https://openalex.org/W4378227212","https://openalex.org/W4390887436","https://openalex.org/W4405182596","https://openalex.org/W4405717558","https://openalex.org/W4410639839","https://openalex.org/W4412536235"],"related_works":[],"abstract_inverted_index":{"In":[0,78],"real-world":[1],"scenarios,":[2],"computing":[3],"the":[4,18,32,39,45,73,76,99,104,107,112,126,129,133,140,160,180,187],"shortest":[5,47,59,86,135],"path":[6,60,87],"between":[7,72,125],"given":[8],"source":[9],"and":[10,75,106,128,144,176],"destination":[11],"is":[12,162,184],"widely":[13],"prevalent,":[14],"such":[15],"as":[16],"seeking":[17],"optimal":[19],"route":[20],"in":[21,28,41],"a":[22,52,83,117],"road":[23],"network":[24],"for":[25,97,186],"navigation.":[26],"However,":[27],"traditional":[29],"non-private":[30],"solutions,":[31],"user":[33,74,105,127,181,189],"discloses":[34],"its":[35],"location":[36,100],"information":[37,101,109],"to":[38,43,51,131],"server":[40,130,161],"order":[42],"obtain":[44,132],"targeted":[46,134],"path,":[48],"giving":[49],"rise":[50],"significant":[53],"privacy":[54,66,96,157],"leakage":[55],"problem.":[56],"Existing":[57],"private":[58,85],"computation":[61,88,120],"schemes":[62],"either":[63],"provide":[64],"limited":[65,191],"guarantees":[67],"or":[68],"require":[69],"multiple":[70],"interactions":[71],"server.":[77,113],"this":[79],"paper,":[80],"we":[81,115,138],"introduce":[82],"fully":[84],"scheme,":[89],"named":[90],"Srchpa.":[91],"This":[92],"scheme":[93,154,171],"ensures":[94],"full":[95,156],"both":[98],"provided":[102],"by":[103,111],"routing":[108],"held":[110],"Furthermore,":[114],"propose":[116],"locally":[118],"iterative":[119],"method,":[121],"achieving":[122],"single-round":[123],"interaction":[124],"path.":[136],"Finally,":[137],"present":[139],"formal":[141],"security":[142,149],"analyses":[143,150],"comprehensive":[145],"experiment":[146,165],"evaluations.":[147],"The":[148,164],"demonstrate":[151],"that":[152,169],"our":[153,170],"achieves":[155],"even":[158],"if":[159],"malicious.":[163],"evaluation":[166],"results":[167],"show":[168],"has":[172],"lower":[173],"computation,":[174],"communication":[175],"storage":[177],"costs":[178],"on":[179],"side,":[182],"thus":[183],"practical":[185],"lightweight":[188],"with":[190],"resources.":[192]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-15T00:00:00"}
