{"id":"https://openalex.org/W2792605750","doi":"https://doi.org/10.1109/tifs.2018.2799486","title":"Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols","display_name":"Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols","publication_year":2018,"publication_date":"2018-01-29","ids":{"openalex":"https://openalex.org/W2792605750","doi":"https://doi.org/10.1109/tifs.2018.2799486","mag":"2792605750"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2018.2799486","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2799486","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://cora.ucc.ie/bitstreams/aaf76661-c20a-4e1d-8f88-d7331dd73731/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055148841","display_name":"Luca Calderoni","orcid":"https://orcid.org/0000-0001-8294-7713"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Luca Calderoni","raw_affiliation_strings":["Department of Computer Science and Engineering, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Bologna, Italy","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041742418","display_name":"Paolo Palmieri","orcid":"https://orcid.org/0000-0002-9819-4880"},"institutions":[{"id":"https://openalex.org/I27577105","display_name":"University College Cork","ror":"https://ror.org/03265fv13","country_code":"IE","type":"education","lineage":["https://openalex.org/I27577105"]},{"id":"https://openalex.org/I82284825","display_name":"Cranfield University","ror":"https://ror.org/05cncd958","country_code":"GB","type":"education","lineage":["https://openalex.org/I82284825"]}],"countries":["GB","IE"],"is_corresponding":false,"raw_author_name":"Paolo Palmieri","raw_affiliation_strings":["Cranfield University, Cranfield, U.K","Department of Computer Science, University College Cork, Cork, Ireland"],"affiliations":[{"raw_affiliation_string":"Cranfield University, Cranfield, U.K","institution_ids":["https://openalex.org/I82284825"]},{"raw_affiliation_string":"Department of Computer Science, University College Cork, Cork, Ireland","institution_ids":["https://openalex.org/I27577105"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056262479","display_name":"Dario Maio","orcid":"https://orcid.org/0000-0002-0094-0022"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Dario Maio","raw_affiliation_strings":["Department of Computer Science and Engineering, Bologna, Italy"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Bologna, Italy","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5055148841"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.3679,"has_fulltext":true,"cited_by_count":16,"citation_normalized_percentile":{"value":0.82850979,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"13","issue":"7","first_page":"1710","last_page":"1721"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.9482688307762146},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8858325481414795},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.6558741331100464},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6488862037658691},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5709507465362549},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.5477449893951416},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5392367839813232},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.515347421169281},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4894329607486725},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.42405790090560913},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.38579195737838745},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.32021939754486084},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.27386730909347534},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20249122381210327},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11849680542945862}],"concepts":[{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.9482688307762146},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8858325481414795},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.6558741331100464},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6488862037658691},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5709507465362549},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.5477449893951416},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5392367839813232},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.515347421169281},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4894329607486725},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.42405790090560913},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.38579195737838745},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.32021939754486084},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.27386730909347534},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20249122381210327},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11849680542945862},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2018.2799486","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2018.2799486","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:http://www.rian.ie/148661/","is_oa":true,"landing_page_url":"http://hdl.handle.net/10468/5767","pdf_url":"https://cora.ucc.ie/bitstreams/aaf76661-c20a-4e1d-8f88-d7331dd73731/download","source":{"id":"https://openalex.org/S4306400033","display_name":"Arrow@dit (Dublin Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115570527","host_organization_name":"Dublin Institute of Technology","host_organization_lineage":["https://openalex.org/I115570527"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Calderoni, L., Palmieri, P. and Maio, D. (2018) 'Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols',  IEEE Transactions on Information Forensics and Security, 13(7), pp. 1710-1721. doi: 10.1109/TIFS.2018.2799486","raw_type":"Journal article"},{"id":"pmh:oai:cris.unibo.it:11585/629659","is_oa":false,"landing_page_url":"http://ieeexplore.ieee.org/document/8271998/","pdf_url":null,"source":{"id":"https://openalex.org/S4306402579","display_name":"Archivio istituzionale della ricerca (Alma Mater Studiorum Universit\u00e0 di Bologna)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210117483","host_organization_name":"Istituto di Ematologia di Bologna","host_organization_lineage":["https://openalex.org/I4210117483"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"pmh:http://www.rian.ie/148661/","is_oa":true,"landing_page_url":"http://hdl.handle.net/10468/5767","pdf_url":"https://cora.ucc.ie/bitstreams/aaf76661-c20a-4e1d-8f88-d7331dd73731/download","source":{"id":"https://openalex.org/S4306400033","display_name":"Arrow@dit (Dublin Institute of Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I115570527","host_organization_name":"Dublin Institute of Technology","host_organization_lineage":["https://openalex.org/I115570527"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Calderoni, L., Palmieri, P. and Maio, D. (2018) 'Probabilistic Properties of the Spatial Bloom Filters and Their Relevance to Cryptographic Protocols',  IEEE Transactions on Information Forensics and Security, 13(7), pp. 1710-1721. doi: 10.1109/TIFS.2018.2799486","raw_type":"Journal article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2792605750.pdf","grobid_xml":"https://content.openalex.org/works/W2792605750.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W274539882","https://openalex.org/W1549681244","https://openalex.org/W2005806403","https://openalex.org/W2043012581","https://openalex.org/W2117354552","https://openalex.org/W2123845384","https://openalex.org/W2132172731","https://openalex.org/W2141965543","https://openalex.org/W2171431911","https://openalex.org/W2468341663","https://openalex.org/W2527843324","https://openalex.org/W2543340598","https://openalex.org/W2624261940","https://openalex.org/W6632885495"],"related_works":["https://openalex.org/W2227807207","https://openalex.org/W2370014100","https://openalex.org/W1852009617","https://openalex.org/W3137108924","https://openalex.org/W4287264924","https://openalex.org/W2042819006","https://openalex.org/W2170165007","https://openalex.org/W1979110442","https://openalex.org/W2156660460","https://openalex.org/W2903388824"],"abstract_inverted_index":{"The":[0,58],"classical":[1,52],"Bloom":[2,53,63,73],"filter":[3,54,64],"data":[4,43,117],"structure":[5,44],"is":[6],"a":[7,41,98,150,170,205],"crucial":[8],"component":[9],"of":[10,12,34,50,71,94,100,114,142,152,188,207],"hundreds":[11],"cryptographic":[13,95,191],"protocols.":[14],"It":[15],"has":[16,55,88],"been":[17,56,89,123],"used":[18,90],"in":[19,27,91,133,160,169,183,204],"privacy":[20,104,210],"preservation":[21],"and":[22,46,105,135,157,177,209],"secure":[23],"computation":[24],"settings,":[25],"often":[26],"conjunction":[28],"with":[29],"the":[30,48,51,67,72,86,92,111,139,143,162,173,186,195,198],"(somewhat)":[31],"homomorphic":[32],"properties":[33,120,141],"ciphers":[35],"such":[36],"as":[37,155],"Paillier's.":[38],"In":[39,126,145],"2014,":[40],"new":[42,59],"extending":[45],"surpassing":[47],"capabilities":[49],"proposed.":[57],"primitive,":[60],"called":[61],"spatial":[62],"(SBF)":[65],"retains":[66],"hash-based":[68],"membership-query":[69],"design":[70,93,187],"filter,":[74,171],"but":[75],"applies":[76],"it":[77],"to":[78,110,165,200],"elements":[79],"from":[80],"multiple":[81],"sets.":[82],"Since":[83],"its":[84,119],"introduction,":[85],"SBF":[87],"protocols":[96,192],"for":[97],"number":[99,151,206],"domains,":[101],"including":[102,172],"location":[103],"network":[106],"security.":[107],"However,":[108],"due":[109],"complex":[112],"nature":[113],"this":[115,127,131],"probabilistic":[116,140],"structure,":[118],"had":[121],"not":[122],"fully":[124,137],"understood.":[125],"paper,":[128],"we":[129,136,148],"address":[130],"gap":[132],"knowledge":[134],"explore":[138],"SBF.":[144],"doing":[146],"so,":[147],"define":[149],"metrics":[153],"(such":[154],"emersion":[156],"safeness)":[158],"useful":[159],"determining":[161],"parameters":[163],"needed":[164],"achieve":[166],"certain":[167],"characteristics":[168],"false":[174],"positive":[175],"probability":[176],"inter-set":[178],"error":[179],"rate.":[180],"This":[181],"will":[182],"turn":[184],"enable":[185],"more":[189],"efficient":[190],"based":[193],"on":[194],"SBF,":[196],"opening":[197],"way":[199],"their":[201],"practical":[202],"application":[203],"security":[208],"settings.":[211]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
