{"id":"https://openalex.org/W2075178836","doi":"https://doi.org/10.1145/1455526.1455529","title":"New Techniques for Private Stream Searching","display_name":"New Techniques for Private Stream Searching","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2075178836","doi":"https://doi.org/10.1145/1455526.1455529","mag":"2075178836"},"language":"en","primary_location":{"id":"doi:10.1145/1455526.1455529","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455526.1455529","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003657358","display_name":"John Bethencourt","orcid":null},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"John Bethencourt","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019426968","display_name":"Dawn Song","orcid":"https://orcid.org/0000-0001-9745-6802"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dawn Song","raw_affiliation_strings":["Carnegie Mellon University"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007379830","display_name":"Brent Waters","orcid":"https://orcid.org/0009-0008-9718-8623"},"institutions":[{"id":"https://openalex.org/I1298353152","display_name":"SRI International","ror":"https://ror.org/05s570m15","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1298353152"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brent Waters","raw_affiliation_strings":["SRI International","SRI, International;"],"affiliations":[{"raw_affiliation_string":"SRI International","institution_ids":["https://openalex.org/I1298353152"]},{"raw_affiliation_string":"SRI, International;","institution_ids":["https://openalex.org/I1298353152"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003657358"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":7.2261,"has_fulltext":false,"cited_by_count":73,"citation_normalized_percentile":{"value":0.96988345,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"12","issue":"3","first_page":"1","last_page":"32"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8554528951644897},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.76646488904953},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.7073989510536194},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.6174024939537048},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5862078070640564},{"id":"https://openalex.org/keywords/cloud-storage","display_name":"Cloud storage","score":0.5313407182693481},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4729073941707611},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.46950292587280273},{"id":"https://openalex.org/keywords/upper-and-lower-bounds","display_name":"Upper and lower bounds","score":0.4421311914920807},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4302378296852112},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.3873424232006073},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3504958748817444},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24086755514144897}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8554528951644897},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.76646488904953},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.7073989510536194},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.6174024939537048},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5862078070640564},{"id":"https://openalex.org/C2777059624","wikidata":"https://www.wikidata.org/wiki/Q914359","display_name":"Cloud storage","level":3,"score":0.5313407182693481},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4729073941707611},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.46950292587280273},{"id":"https://openalex.org/C77553402","wikidata":"https://www.wikidata.org/wiki/Q13222579","display_name":"Upper and lower bounds","level":2,"score":0.4421311914920807},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4302378296852112},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3873424232006073},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3504958748817444},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24086755514144897},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1145/1455526.1455529","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1455526.1455529","pdf_url":null,"source":{"id":"https://openalex.org/S2642811","display_name":"ACM Transactions on Information and System Security","issn_l":"1094-9224","issn":["1094-9224","1557-7406"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Information and System Security","raw_type":"journal-article"},{"id":"pmh:ADA456185","is_oa":false,"landing_page_url":"http://oai.dtic.mil/oai/oai?&amp;verb=getRecord&amp;metadataPrefix=html&amp;identifier=ADA456185","pdf_url":null,"source":{"id":"https://openalex.org/S4406923043","display_name":"Defense Technical Information Center (DTIC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"DTIC","raw_type":"Text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.133.4301","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.133.4301","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.berkeley.edu/~bethenco/search.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.138.3281","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.3281","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://reports-archive.adm.cs.cmu.edu/anon/anon/home/ftp/2006/CMU-CS-06-106.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.157.5578","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.5578","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.berkeley.edu/~bethenco/tissec09search.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.259.9138","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.259.9138","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.berkeley.edu/%7Edawnsong/papers/2009%20new%20techniques%20a16-bethencourt.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[{"id":"https://openalex.org/G4066024256","display_name":null,"funder_award_id":"W911NF-06-1-0316","funder_id":"https://openalex.org/F4320338281","funder_display_name":"Army Research Office"},{"id":"https://openalex.org/G7948891957","display_name":null,"funder_award_id":"2006-CS-001-000001","funder_id":"https://openalex.org/F4320306110","funder_display_name":"U.S. Department of Homeland Security"}],"funders":[{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"},{"id":"https://openalex.org/F4320338281","display_name":"Army Research Office","ror":"https://ror.org/05epdh915"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W28930810","https://openalex.org/W31845566","https://openalex.org/W1511913323","https://openalex.org/W1544327602","https://openalex.org/W1574024822","https://openalex.org/W1596482432","https://openalex.org/W1655958391","https://openalex.org/W1889757464","https://openalex.org/W1963094505","https://openalex.org/W1979740015","https://openalex.org/W1993284846","https://openalex.org/W2009136691","https://openalex.org/W2017464959","https://openalex.org/W2066513831","https://openalex.org/W2080666024","https://openalex.org/W2123845384","https://openalex.org/W2132172731","https://openalex.org/W2135923881","https://openalex.org/W2147929033","https://openalex.org/W2149389044","https://openalex.org/W2150307013","https://openalex.org/W2154654620","https://openalex.org/W2161214567","https://openalex.org/W2511724275","https://openalex.org/W2569727523","https://openalex.org/W4247588434","https://openalex.org/W4252185742","https://openalex.org/W6667279045"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2604468458","https://openalex.org/W2157216338","https://openalex.org/W1662107788","https://openalex.org/W121740227","https://openalex.org/W3082379938","https://openalex.org/W2135966669","https://openalex.org/W2030773053","https://openalex.org/W2227807207","https://openalex.org/W2350813731"],"abstract_inverted_index":{"A":[0],"system":[1,149],"for":[2,56,114,197,226],"private":[3,58,115],"stream":[4,31,116],"searching,":[5],"introduced":[6],"by":[7,146],"Ostrovsky":[8,203],"and":[9,34,129,204,217,251,278],"Skeith,":[10],"allows":[11,154],"a":[12,30,53,135,148,162,184,233,280,306],"client":[13,41,72],"to":[14,39,71,75,120,158,170,189,194],"provide":[15,286],"an":[16,20,86,223,287],"untrusted":[17],"server":[18,25,70,100],"with":[19,209],"encrypted":[21,235],"search":[22,60,103],"query.":[23,50],"The":[24,95,110],"uses":[26],"the":[27,36,40,46,49,77,80,90,93,99,102,140,143,155,174,195,199,228,257,262,301,311],"query":[28],"on":[29,61,89,98,168,232],"of":[32,48,79,92,150,187,202,259,282,290,304,310],"documents":[33,38,157,260],"returns":[35],"matching":[37,81,144,156],"while":[42],"learning":[43],"nothing":[44],"about":[45],"nature":[47],"We":[51,220,284],"present":[52,222],"new":[54],"scheme":[55,113,201],"conducting":[57,101],"keyword":[59],"streaming":[62],"data":[63],"which":[64,139],"requires":[65,183,241],"O":[66,106,122,210,242],"(":[67,107,123,211,243],"m":[68,84,108,124,126,212,214,244,248],")":[69,127,215],"communication":[73,128,216,250],"complexity":[74],"return":[76],"content":[78],"documents,":[82],"where":[83,254],"is":[85,104,256],"upper":[87],"bound":[88],"size":[91],"documents.":[94],"required":[96],"storage":[97,130,175,218,252],"also":[105,221,285],").":[109],"previous":[111,179],"best":[112],"searching":[117],"was":[118],"shown":[119],"have":[121],"log":[125,213],"complexity.":[131,219],"Our":[132],"solution":[133],"employs":[134],"novel":[136],"construction":[137],"in":[138,161,173,178,192,261,293,300],"user":[141],"reconstructs":[142],"files":[145],"solving":[147],"linear":[151],"equations.":[152],"This":[153,181,239],"be":[159,190,207],"stored":[160],"compact":[163],"buffer":[164,176],"rather":[165],"than":[166],"relying":[167],"redundancies":[169],"avoid":[171],"collisions":[172],"as":[177],"work.":[180],"technique":[182],"small":[185],"amount":[186],"metadata":[188,230],"returned":[191],"addition":[193],"documents;":[196],"this":[198,265],"original":[200],"Skeith":[205],"may":[206],"employed":[208],"alternative":[224],"method":[225,240],"returning":[227],"necessary":[229],"based":[231],"unique":[234],"Bloom":[236],"filter":[237],"construction.":[238],"log(":[245],"t":[246,255],"/":[247],"))":[249],"complexity,":[253],"number":[258,281],"stream.":[263],"In":[264],"article":[266],"we":[267,296],"describe":[268,279],"our":[269],"scheme,":[270],"prove":[271],"it":[272],"secure,":[273],"analyze":[274],"its":[275,291,298],"asymptotic":[276],"performance,":[277],"extensions.":[283],"experimental":[288],"analysis":[289],"scalability":[292],"practice.":[294],"Specifically,":[295],"consider":[297],"performance":[299],"demanding":[302],"scenario":[303],"providing":[305],"privacy":[307],"preserving":[308],"version":[309],"Google":[312],"News":[313],"Alerts":[314],"service.":[315]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":9},{"year":2013,"cited_by_count":13},{"year":2012,"cited_by_count":8}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
