{"id":"https://openalex.org/W7092203463","doi":"https://doi.org/10.1109/tkde.2025.3622591","title":"SeaCQ: Secure and Efficient Authenticated Conjunctive Query in Hybrid-Storage Blockchains","display_name":"SeaCQ: Secure and Efficient Authenticated Conjunctive Query in Hybrid-Storage Blockchains","publication_year":2025,"publication_date":"2025-10-16","ids":{"openalex":"https://openalex.org/W7092203463","doi":"https://doi.org/10.1109/tkde.2025.3622591"},"language":null,"primary_location":{"id":"doi:10.1109/tkde.2025.3622591","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2025.3622591","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Xu Yang","orcid":"https://orcid.org/0000-0003-0094-6245"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu Yang","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0003-0094-6245","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hongguang Zhao","orcid":"https://orcid.org/0009-0006-4835-9399"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongguang Zhao","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0009-0006-4835-9399","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Saiyu Qi","orcid":"https://orcid.org/0000-0002-0394-4432"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Saiyu Qi","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-0394-4432","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]},{"author_position":"last","author":{"id":null,"display_name":"Yong Qi","orcid":"https://orcid.org/0000-0002-7682-5653"},"institutions":[{"id":"https://openalex.org/I87445476","display_name":"Xi'an Jiaotong University","ror":"https://ror.org/017zhmm22","country_code":"CN","type":"education","lineage":["https://openalex.org/I87445476"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Qi","raw_affiliation_strings":["School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China"],"raw_orcid":"https://orcid.org/0000-0002-7682-5653","affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China","institution_ids":["https://openalex.org/I87445476"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I87445476"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.62933985,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"38","issue":"1","first_page":"573","last_page":"587"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T14160","display_name":"Water management and technologies","score":0.06300000101327896,"subfield":{"id":"https://openalex.org/subfields/1105","display_name":"Ecology, Evolution, Behavior and Systematics"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},"topics":[{"id":"https://openalex.org/T14160","display_name":"Water management and technologies","score":0.06300000101327896,"subfield":{"id":"https://openalex.org/subfields/1105","display_name":"Ecology, Evolution, Behavior and Systematics"},"field":{"id":"https://openalex.org/fields/11","display_name":"Agricultural and Biological Sciences"},"domain":{"id":"https://openalex.org/domains/1","display_name":"Life Sciences"}},{"id":"https://openalex.org/T12201","display_name":"Agricultural Engineering and Mechanization","score":0.03530000150203705,"subfield":{"id":"https://openalex.org/subfields/2210","display_name":"Mechanical Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10087","display_name":"Archaeology and ancient environmental studies","score":0.03020000085234642,"subfield":{"id":"https://openalex.org/subfields/1911","display_name":"Paleontology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/conjunctive-query","display_name":"Conjunctive query","score":0.6072999835014343},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6043000221252441},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.5819000005722046},{"id":"https://openalex.org/keywords/boolean-conjunctive-query","display_name":"Boolean conjunctive query","score":0.569100022315979},{"id":"https://openalex.org/keywords/query-optimization","display_name":"Query optimization","score":0.5281999707221985},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.46540001034736633},{"id":"https://openalex.org/keywords/sargable","display_name":"Sargable","score":0.4586000144481659},{"id":"https://openalex.org/keywords/authenticated-encryption","display_name":"Authenticated encryption","score":0.45730000734329224},{"id":"https://openalex.org/keywords/query-language","display_name":"Query language","score":0.4284000098705292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8885999917984009},{"id":"https://openalex.org/C65647387","wikidata":"https://www.wikidata.org/wiki/Q1781706","display_name":"Conjunctive query","level":3,"score":0.6072999835014343},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6043000221252441},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.5819000005722046},{"id":"https://openalex.org/C24755975","wikidata":"https://www.wikidata.org/wiki/Q4943354","display_name":"Boolean conjunctive query","level":5,"score":0.569100022315979},{"id":"https://openalex.org/C157692150","wikidata":"https://www.wikidata.org/wiki/Q2919848","display_name":"Query optimization","level":2,"score":0.5281999707221985},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46540001034736633},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.4586000144481659},{"id":"https://openalex.org/C128619300","wikidata":"https://www.wikidata.org/wiki/Q15263584","display_name":"Authenticated encryption","level":3,"score":0.45730000734329224},{"id":"https://openalex.org/C192028432","wikidata":"https://www.wikidata.org/wiki/Q845739","display_name":"Query language","level":2,"score":0.4284000098705292},{"id":"https://openalex.org/C118689300","wikidata":"https://www.wikidata.org/wiki/Q7978614","display_name":"Web query classification","level":4,"score":0.4097999930381775},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3817000091075897},{"id":"https://openalex.org/C99016210","wikidata":"https://www.wikidata.org/wiki/Q5488129","display_name":"Query expansion","level":2,"score":0.3813000023365021},{"id":"https://openalex.org/C141492731","wikidata":"https://www.wikidata.org/wiki/Q1052621","display_name":"Message authentication code","level":3,"score":0.3752000033855438},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.36800000071525574},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.36000001430511475},{"id":"https://openalex.org/C17231256","wikidata":"https://www.wikidata.org/wiki/Q5156540","display_name":"Completeness (order theory)","level":2,"score":0.3407999873161316},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.33250001072883606},{"id":"https://openalex.org/C118930307","wikidata":"https://www.wikidata.org/wiki/Q600590","display_name":"Tuple","level":2,"score":0.32679998874664307},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.3086000084877014},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3077999949455261},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.301800012588501},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.29739999771118164},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.29660001397132874},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.2924000024795532},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.29100000858306885},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.27399998903274536},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.2685000002384186},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25870001316070557},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.25600001215934753},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.2535000145435333},{"id":"https://openalex.org/C168970074","wikidata":"https://www.wikidata.org/wiki/Q5227146","display_name":"Data Authentication Algorithm","level":4,"score":0.2524000108242035}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tkde.2025.3622591","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tkde.2025.3622591","pdf_url":null,"source":{"id":"https://openalex.org/S30698027","display_name":"IEEE Transactions on Knowledge and Data Engineering","issn_l":"1041-4347","issn":["1041-4347","1558-2191","2326-3865"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Knowledge and Data Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1502708590","https://openalex.org/W1509788133","https://openalex.org/W1562394980","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2765463836","https://openalex.org/W2891871515","https://openalex.org/W2903368601","https://openalex.org/W2914539352","https://openalex.org/W2952570284","https://openalex.org/W2972851249","https://openalex.org/W2972997072","https://openalex.org/W3128530640","https://openalex.org/W3139404512","https://openalex.org/W3176377144","https://openalex.org/W3179996071","https://openalex.org/W3207007432","https://openalex.org/W4285110229","https://openalex.org/W4289533977","https://openalex.org/W4295993302","https://openalex.org/W4312535394","https://openalex.org/W4312596426","https://openalex.org/W4317038445","https://openalex.org/W4386824979","https://openalex.org/W4387885958","https://openalex.org/W4388714490","https://openalex.org/W4391179622","https://openalex.org/W4391305725","https://openalex.org/W4400859425","https://openalex.org/W4400910515","https://openalex.org/W4401726202","https://openalex.org/W4410027466","https://openalex.org/W4411023304"],"related_works":[],"abstract_inverted_index":{"Data":[0],"has":[1],"become":[2],"a":[3,31,66,115,127,142,171,176],"critical":[4],"economic":[5],"asset":[6],"in":[7,58,73,80,95,100],"recent":[8],"years.":[9],"To":[10,108],"enable":[11],"secure":[12,90,119],"and":[13,26,42,49,69,91,105,120,151,183,189],"reliable":[14],"access":[15],"to":[16,88,134,147],"data":[17,38,44],"assets,":[18],"the":[19,36,85,149,187,192],"combination":[20],"of":[21,102,153,166,191],"symmetric":[22],"searchable":[23],"encryption":[24],"(SSE)":[25],"Hybrid-storage":[27],"blockchains":[28],"(HSB)":[29],"offers":[30],"promising":[32],"solution":[33],"by":[34],"storing":[35],"authenticated":[37,50,92,122,131],"structure":[39],"(ADS)":[40],"on-chain":[41,178],"encrypted":[43,51,55],"off-chain,":[45],"thus":[46],"enabling":[47],"efficient":[48,121],"queries.":[52,82,124],"However,":[53],"existing":[54],"query":[56,71,78,104,132,137,154],"schemes":[57],"HSB":[59,96],"either":[60],"lack":[61],"support":[62,89],"for":[63,118],"conjunctive":[64,81,93,123],"queries,":[65],"commonly":[67],"used":[68],"important":[70],"pattern":[72],"databases,":[74],"or":[75],"exhibit":[76],"low":[77],"efficiency":[79,190],"vsChain":[83],"was":[84],"first":[86],"scheme":[87,117],"queries":[94],"but":[97],"had":[98],"drawbacks":[99],"terms":[101],"high":[103],"authentication":[106,145],"costs.":[107],"overcome":[109],"these":[110],"limitations,":[111],"we":[112,162],"introduce":[113],"SeaCQ,":[114,167],"novel":[116],"SeaCQ":[125],"employs":[126],"meticulously":[128],"designed":[129],"two-stage":[130],"process":[133],"achieve":[135],"optimal":[136],"efficiency.":[138],"It":[139],"also":[140],"incorporates":[141],"customized":[143],"double-layer":[144],"mechanism":[146],"ensure":[148],"correctness":[150],"completeness":[152],"results":[155,185],"efficiently":[156],"while":[157],"providing":[158],"error":[159],"localization.":[160],"Additionally,":[161],"present":[163],"an":[164],"extension":[165],"SeaCQ*,":[168],"which":[169],"is":[170],"gas-efficient":[172],"version":[173],"that":[174],"utilizes":[175],"constant-size":[177],"ADS.":[179],"Our":[180],"security":[181,188],"analysis":[182],"experimental":[184],"validate":[186],"proposed":[193],"schemes.":[194]},"counts_by_year":[],"updated_date":"2025-12-11T00:21:10.989143","created_date":"2025-10-17T00:00:00"}
