{"id":"https://openalex.org/W4409992468","doi":"https://doi.org/10.1109/tnsm.2025.3565943","title":"Enabling Privacy-Preserving Top-k Hamming Distance Query on the Cloud","display_name":"Enabling Privacy-Preserving Top-k Hamming Distance Query on the Cloud","publication_year":2025,"publication_date":"2025-05-01","ids":{"openalex":"https://openalex.org/W4409992468","doi":"https://doi.org/10.1109/tnsm.2025.3565943"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2025.3565943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3565943","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5107898541","display_name":"Wenjing Gao","orcid":"https://orcid.org/0000-0002-9938-1442"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Wenjing Gao","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056578494","display_name":"Jia Yu","orcid":"https://orcid.org/0000-0002-0574-7803"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jia Yu","raw_affiliation_strings":["College of Computer Science and Technology, Qingdao University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Qingdao University, Qingdao, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5107898541"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04061423,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"22","issue":"4","first_page":"3341","last_page":"3354"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9606000185012817,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8441997766494751},{"id":"https://openalex.org/keywords/hamming-distance","display_name":"Hamming distance","score":0.6687169671058655},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6182761788368225},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.4299038052558899},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.386766642332077},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3246641159057617},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.22762387990951538},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08313193917274475},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.0750274658203125},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.07181411981582642}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8441997766494751},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.6687169671058655},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6182761788368225},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.4299038052558899},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.386766642332077},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3246641159057617},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.22762387990951538},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08313193917274475},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.0750274658203125},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.07181411981582642}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2025.3565943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2025.3565943","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5155659853","display_name":null,"funder_award_id":"2022CXGC020102","funder_id":"https://openalex.org/F4320329857","funder_display_name":"Major Scientific and Technological Innovation Project of Shandong Province"},{"id":"https://openalex.org/G5756200516","display_name":null,"funder_award_id":"ZR2024MF038","funder_id":"https://openalex.org/F4320324174","funder_display_name":"Natural Science Foundation of Shandong Province"},{"id":"https://openalex.org/G7748622017","display_name":null,"funder_award_id":"62172245","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324174","display_name":"Natural Science Foundation of Shandong Province","ror":null},{"id":"https://openalex.org/F4320329857","display_name":"Major Scientific and Technological Innovation Project of Shandong Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W1571821840","https://openalex.org/W1572300106","https://openalex.org/W1993820538","https://openalex.org/W2076478806","https://openalex.org/W2132172731","https://openalex.org/W2575938897","https://openalex.org/W2618583153","https://openalex.org/W2737889100","https://openalex.org/W2793031414","https://openalex.org/W2949098856","https://openalex.org/W2962149853","https://openalex.org/W2964181521","https://openalex.org/W2964294185","https://openalex.org/W2970213526","https://openalex.org/W2970598121","https://openalex.org/W3082110198","https://openalex.org/W3091484551","https://openalex.org/W3092115729","https://openalex.org/W3108285671","https://openalex.org/W3181110568","https://openalex.org/W3183182060","https://openalex.org/W3208543388","https://openalex.org/W4205505117","https://openalex.org/W4210300416","https://openalex.org/W4285216180","https://openalex.org/W4319592676","https://openalex.org/W4323266734","https://openalex.org/W4361801572","https://openalex.org/W4376851522","https://openalex.org/W4385376471","https://openalex.org/W4394843513","https://openalex.org/W4402592506","https://openalex.org/W4402668805","https://openalex.org/W4403510269","https://openalex.org/W4406094085","https://openalex.org/W4409316425","https://openalex.org/W6677829731"],"related_works":["https://openalex.org/W2943247777","https://openalex.org/W2740543340","https://openalex.org/W2371167013","https://openalex.org/W1493958394","https://openalex.org/W1582340598","https://openalex.org/W2794545997","https://openalex.org/W2584980534","https://openalex.org/W2182731056","https://openalex.org/W1600949677","https://openalex.org/W2779867339"],"abstract_inverted_index":{"The":[0,40,138],"top-k":[1,48,66,85,106,164],"Hamming":[2,15,49,67,86,107,144],"distance":[3,16,50,68,87,108,145],"query":[4,19,51,64,88,153,159,165],"is":[5,131,191,200,210],"to":[6,17,81,101,122,157,177],"find":[7],"the":[8,13,18,47,61,65,70,83,90,93,104,114,124,128,134,143,147,151,158,163,168,173,180,185,194,198,207,213,219,222,227,230],"k":[9],"optimal":[10],"objects":[11],"with":[12],"smallest":[14],"data.":[20],"It":[21],"has":[22],"a":[23,73],"wide":[24],"range":[25],"of":[26,188,197,221,229],"applications":[27],"in":[28,52,72,212],"many":[29],"domains":[30],"such":[31],"as":[32],"social":[33],"networks,":[34],"image":[35],"retrieval":[36],"and":[37,117,127,193,225],"biological":[38],"recognition.":[39],"existing":[41],"privacy-preserving":[42,84,105],"protocols":[43,80,224],"do":[44],"not":[45],"support":[46],"practice.":[53],"To":[54,110],"address":[55],"this":[56],"issue,":[57],"we":[58,171],"consider":[59],"letting":[60],"user":[62,125,160],"securely":[63],"on":[69,89,133,146],"cloud":[71,97,136,140],"secure":[74],"outsourcing":[75],"manner.":[76],"We":[77],"propose":[78],"two":[79,96],"realize":[82],"cloud.":[91],"In":[92,167],"first":[94,135],"protocol,":[95,170],"servers":[98],"are":[99,120,155],"introduced":[100],"cooperatively":[102],"complete":[103],"query.":[109],"preserve":[111],"data":[112,130,174,208],"privacy,":[113],"Paillier":[115],"encryption":[116],"randomization":[118],"techniques":[119],"leveraged":[121],"blind":[123],"data,":[126,184],"ciphertext":[129],"stored":[132],"server.":[137],"second":[139,169,231],"server":[141],"calculates":[142],"ciphertexts.":[148],"After":[149],"that,":[150],"encrypted":[152],"results":[154,217],"returned":[156],"for":[161],"recovering":[162],"results.":[166],"adopt":[172],"aggregation":[175],"strategy":[176],"further":[178],"enhance":[179],"efficiency.":[181],"By":[182],"packaging":[183],"computation":[186],"overhead":[187,196],"each":[189],"participant":[190],"reduced":[192],"communication":[195],"protocol":[199],"decreased,":[201],"remarkably.":[202],"Security":[203],"analysis":[204],"demonstrates":[205],"that":[206],"privacy":[209],"guaranteed":[211],"proposed":[214,223],"protocols.":[215],"Experimental":[216],"evaluate":[218],"performance":[220],"confirm":[226],"superiority":[228],"protocol.":[232]},"counts_by_year":[],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-05-02T00:00:00"}
