{"id":"https://openalex.org/W3206970138","doi":"https://doi.org/10.1109/tifs.2021.3118880","title":"Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees","display_name":"Enabling Efficient Spatial Keyword Queries on Encrypted Data With Strong Security Guarantees","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3206970138","doi":"https://doi.org/10.1109/tifs.2021.3118880","mag":"3206970138"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2021.3118880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3118880","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ink.library.smu.edu.sg/sis_research/10136","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5044015155","display_name":"Xiangyu Wang","orcid":"https://orcid.org/0000-0002-6420-8308"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiangyu Wang","raw_affiliation_strings":["School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China. (e-mail: xywang_xidian@163.com)"],"raw_orcid":"https://orcid.org/0000-0002-6420-8308","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China. (e-mail: xywang_xidian@163.com)","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012016098","display_name":"Jianfeng Ma","orcid":"https://orcid.org/0000-0003-4251-1143"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Ma","raw_affiliation_strings":["School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China","School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an 710071, China"],"raw_orcid":"https://orcid.org/0000-0003-4251-1143","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102017758","display_name":"Feng Li","orcid":"https://orcid.org/0000-0002-8294-7606"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Li","raw_affiliation_strings":["School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China","School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an 710071, China"],"raw_orcid":"https://orcid.org/0000-0002-8294-7606","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi\u2019an 710071, China","institution_ids":["https://openalex.org/I149594827"]},{"raw_affiliation_string":"School of Cyber Engineering and the Shaanxi Key Laboratory of Network and System Security, Xidian University, Xi'an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058120371","display_name":"Ximeng Liu","orcid":"https://orcid.org/0000-0002-4238-3295"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ximeng Liu","raw_affiliation_strings":["College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China"],"raw_orcid":"https://orcid.org/0000-0002-4238-3295","affiliations":[{"raw_affiliation_string":"College of Mathematics and Computer Science, Fuzhou University, Fuzhou 350108, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102885964","display_name":"Yinbin Miao","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I168719708","display_name":"City University of Hong Kong","ror":"https://ror.org/03q8dnn23","country_code":"HK","type":"education","lineage":["https://openalex.org/I168719708"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Yinbin Miao","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China; Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China; Department of Computer Science, City University of Hong Kong, Hong Kong 999077, China","Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China","Department of Computer Science, City University of Hong Kong, Hong Kong 999077, China","School of Cyber Engineering, Xidian University, Xi'an 710071, China"],"raw_orcid":"https://orcid.org/0000-0001-5437-3572","affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi\u2019an 710071, China; Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China; Department of Computer Science, City University of Hong Kong, Hong Kong 999077, China","institution_ids":["https://openalex.org/I168719708","https://openalex.org/I5343935"]},{"raw_affiliation_string":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin 541004, China","institution_ids":["https://openalex.org/I5343935"]},{"raw_affiliation_string":"Department of Computer Science, City University of Hong Kong, Hong Kong 999077, China","institution_ids":["https://openalex.org/I168719708"]},{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an 710071, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5001712801","display_name":"Robert H. Deng","orcid":"https://orcid.org/0000-0003-3491-8146"},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Information Systems, Singapore Management University, Singapore 188065, Singapore"],"raw_orcid":"https://orcid.org/0000-0003-3491-8146","affiliations":[{"raw_affiliation_string":"School of Information Systems, Singapore Management University, Singapore 188065, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5044015155"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":3.9195,"has_fulltext":false,"cited_by_count":54,"citation_normalized_percentile":{"value":0.94624017,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"16","issue":null,"first_page":"4909","last_page":"4923"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9926999807357788,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8886219263076782},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.753270149230957},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6063300371170044},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.5034489035606384},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.49837422370910645},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.44681620597839355},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4402661919593811},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39394617080688477},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.164653480052948}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8886219263076782},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.753270149230957},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6063300371170044},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.5034489035606384},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.49837422370910645},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.44681620597839355},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4402661919593811},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39394617080688477},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.164653480052948},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tifs.2021.3118880","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2021.3118880","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-11136","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/10136","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2021.3118880","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:ink.library.smu.edu.sg:sis_research-11136","is_oa":true,"landing_page_url":"https://ink.library.smu.edu.sg/sis_research/10136","pdf_url":null,"source":{"id":"https://openalex.org/S4306401925","display_name":"Singapore Management University Institutional Knowledge (InK) (Singapore Management University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I79891267","host_organization_name":"Singapore Management University","host_organization_lineage":["https://openalex.org/I79891267"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"https://doi.org/10.1109/TIFS.2021.3118880","raw_type":"Journal Article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G222556785","display_name":null,"funder_award_id":"2019ZDLGY12-04","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G2306370853","display_name":null,"funder_award_id":"2019JQ-005","funder_id":"https://openalex.org/F4320324173","funder_display_name":"Natural Science Foundation of Shaanxi Province"},{"id":"https://openalex.org/G2880161263","display_name":null,"funder_award_id":"JB191506","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3291271152","display_name":null,"funder_award_id":"U1804263","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G564380355","display_name":null,"funder_award_id":"62072361","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G868405051","display_name":null,"funder_award_id":"2020ZDLGY09-06","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G979158640","display_name":null,"funder_award_id":"62072109","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324173","display_name":"Natural Science Foundation of Shaanxi Province","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1502927489","https://openalex.org/W1539207281","https://openalex.org/W1539859404","https://openalex.org/W1895952394","https://openalex.org/W1966678916","https://openalex.org/W1988374166","https://openalex.org/W2033165262","https://openalex.org/W2041480327","https://openalex.org/W2074388704","https://openalex.org/W2078401527","https://openalex.org/W2123845384","https://openalex.org/W2129534274","https://openalex.org/W2132172731","https://openalex.org/W2145426052","https://openalex.org/W2147929033","https://openalex.org/W2159915142","https://openalex.org/W2167275936","https://openalex.org/W2282819945","https://openalex.org/W2293642771","https://openalex.org/W2294724888","https://openalex.org/W2317269620","https://openalex.org/W2342635042","https://openalex.org/W2422800230","https://openalex.org/W2472177816","https://openalex.org/W2481158741","https://openalex.org/W2536125594","https://openalex.org/W2559781312","https://openalex.org/W2600805457","https://openalex.org/W2603469204","https://openalex.org/W2765463836","https://openalex.org/W2826575142","https://openalex.org/W2889232097","https://openalex.org/W2891871515","https://openalex.org/W2910639144","https://openalex.org/W2920782418","https://openalex.org/W2947185594","https://openalex.org/W2950325202","https://openalex.org/W2951457746","https://openalex.org/W2951475536","https://openalex.org/W2970420884","https://openalex.org/W2973438932","https://openalex.org/W2984157150","https://openalex.org/W2995799768","https://openalex.org/W3046946952","https://openalex.org/W3049294938","https://openalex.org/W3088472513","https://openalex.org/W3106392330","https://openalex.org/W6633548466","https://openalex.org/W6720239471"],"related_works":["https://openalex.org/W2100090372","https://openalex.org/W4361205702","https://openalex.org/W2385965183","https://openalex.org/W4289281780","https://openalex.org/W2013342653","https://openalex.org/W2901818815","https://openalex.org/W4237598585","https://openalex.org/W2359552542","https://openalex.org/W2374897487","https://openalex.org/W2140798747"],"abstract_inverted_index":{"Structured":[0,75],"Encryption":[1,76],"(STE),":[2],"which":[3,52,98,173],"allows":[4],"a":[5,31,91,124,135],"server":[6],"to":[7,114,138],"provide":[8],"secure":[9,193],"search":[10,26,96,117,130,147],"services":[11],"on":[12,41,49,119],"encrypted":[13],"data":[14],"structures,":[15],"has":[16,59],"been":[17,38,61],"widely":[18,54],"investigated":[19],"in":[20,28,56,153],"recent":[21],"years.":[22],"To":[23],"meet":[24,175],"expressive":[25],"requirements":[27],"practical":[29],"applications,":[30],"large":[32],"number":[33],"of":[34,72],"STE":[35,48],"constructions":[36,83,150,191],"have":[37],"proposed":[39,190],"either":[40],"textual":[42],"keywords":[43],"or":[44],"spatial":[45,106],"data.":[46],"However,":[47],"spatio-textual":[50],"data,":[51],"are":[53,151,192],"used":[55],"location-based":[57],"services,":[58],"not":[60],"fully":[62],"investigated.":[63],"In":[64],"this":[65],"paper,":[66],"we":[67,89,122,133],"formally":[68],"define":[69],"the":[70,101,116,154,189,196],"notion":[71],"Spatial":[73],"Keyword":[74],"(SKSE)":[77],"and":[78,109,142,146,170,183,194],"propose":[79,90],"several":[80],"concrete":[81],"SKSE":[82],"with":[84,94,128],"various":[85],"efficiency-security":[86],"trade-offs.":[87],"Firstly,":[88],"basic":[92],"construction":[93,127],"linear":[95],"complexity,":[97],"only":[99],"leaks":[100],"private":[102],"files":[103],"matching":[104],"both":[105],"range":[107],"query":[108,111],"all":[110],"keywords.":[112],"Then,":[113],"improve":[115,144],"efficiency":[118],"large-scale":[120],"datasets,":[121],"present":[123],"novel":[125],"tree-based":[126],"sub-linear":[129],"complexity.":[131],"Finally,":[132],"introduce":[134],"post-validation":[136],"approach":[137],"remove":[139],"false":[140],"positives":[141],"further":[143],"storage":[145],"performance.":[148],"Our":[149,179],"general":[152],"sense":[155],"that":[156,188],"they":[157],"can":[158,174],"be":[159],"constructed":[160],"from":[161],"any":[162],"hidden":[163],"vector":[164],"encryption":[165],"schemes,":[166],"including":[167],"public-key":[168],"setting":[169],"symmetric-key":[171],"setting,":[172],"different":[176],"sharing":[177],"requirements.":[178],"rigorous":[180],"security":[181],"analysis":[182],"comprehensive":[184],"performance":[185],"evaluation":[186],"demonstrate":[187],"outperform":[195],"start-of-the-art":[197],"solutions.":[198]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
