{"id":"https://openalex.org/W1967676347","doi":"https://doi.org/10.1145/2808425.2808431","title":"Fast Order-Preserving Encryption from Uniform Distribution Sampling","display_name":"Fast Order-Preserving Encryption from Uniform Distribution Sampling","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W1967676347","doi":"https://doi.org/10.1145/2808425.2808431","mag":"1967676347"},"language":"en","primary_location":{"id":"doi:10.1145/2808425.2808431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808425.2808431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5111425788","display_name":"Yong Ho Hwang","orcid":null},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Yong Ho Hwang","raw_affiliation_strings":["Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea","institution_ids":["https://openalex.org/I2250650973"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100704335","display_name":"Sungwook Kim","orcid":"https://orcid.org/0000-0003-4789-3347"},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Sungwook Kim","raw_affiliation_strings":["Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea","institution_ids":["https://openalex.org/I2250650973"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083950439","display_name":"Jae Woo Seo","orcid":"https://orcid.org/0009-0000-8134-1947"},"institutions":[{"id":"https://openalex.org/I2250650973","display_name":"Samsung (South Korea)","ror":"https://ror.org/04w3jy968","country_code":"KR","type":"company","lineage":["https://openalex.org/I2250650973"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jae Woo Seo","raw_affiliation_strings":["Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea"],"affiliations":[{"raw_affiliation_string":"Software R&amp;D Center, Samsung Electronics Co., LTD, Suwon, South Korea","institution_ids":["https://openalex.org/I2250650973"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5111425788"],"corresponding_institution_ids":["https://openalex.org/I2250650973"],"apc_list":null,"apc_paid":null,"fwci":0.4314,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.75682897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"41","last_page":"52"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7836213111877441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7304724454879761},{"id":"https://openalex.org/keywords/range","display_name":"Range (aeronautics)","score":0.5453261137008667},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5095987319946289},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.497941255569458},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.4735918343067169},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.4252583682537079},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.09043827652931213},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.0802145004272461}],"concepts":[{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7836213111877441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7304724454879761},{"id":"https://openalex.org/C204323151","wikidata":"https://www.wikidata.org/wiki/Q905424","display_name":"Range (aeronautics)","level":2,"score":0.5453261137008667},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5095987319946289},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.497941255569458},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.4735918343067169},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.4252583682537079},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.09043827652931213},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.0802145004272461},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2808425.2808431","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2808425.2808431","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W754106230","https://openalex.org/W1483091879","https://openalex.org/W1502927489","https://openalex.org/W1556683487","https://openalex.org/W1589843374","https://openalex.org/W1707642611","https://openalex.org/W1799617698","https://openalex.org/W1822223425","https://openalex.org/W1895952394","https://openalex.org/W1992282993","https://openalex.org/W1999670653","https://openalex.org/W2015493040","https://openalex.org/W2030888439","https://openalex.org/W2031533839","https://openalex.org/W2073346043","https://openalex.org/W2089877558","https://openalex.org/W2117362057","https://openalex.org/W2120775753","https://openalex.org/W2136936712","https://openalex.org/W2146813141","https://openalex.org/W2146828512","https://openalex.org/W2151272007","https://openalex.org/W2152516507","https://openalex.org/W2152926062","https://openalex.org/W2154496743","https://openalex.org/W2154654620","https://openalex.org/W2156030242","https://openalex.org/W2161214567","https://openalex.org/W2163992091","https://openalex.org/W2167606175","https://openalex.org/W2184702105","https://openalex.org/W2398927423","https://openalex.org/W2399539053"],"related_works":["https://openalex.org/W1497573972","https://openalex.org/W4401399649","https://openalex.org/W2071659383","https://openalex.org/W1846253165","https://openalex.org/W2033706604","https://openalex.org/W2952775124","https://openalex.org/W3020669001","https://openalex.org/W4299822202","https://openalex.org/W2001017018","https://openalex.org/W2164472287"],"abstract_inverted_index":{"Order-preserving":[0],"encryption":[1,6,85],"(OPE)":[2],"is":[3,121,149],"a":[4,61,81,105],"symmetric":[5],"that":[7],"ciphertexts":[8],"preserve":[9],"numerical":[10,114],"ordering":[11],"of":[12,26,50,93,113,141,146,155],"the":[13,24,48,94,117,125,136,152],"corresponding":[14],"plaintexts.":[15],"It":[16,129],"allows":[17],"various":[18],"applications":[19,58],"to":[20,109],"search":[21],"or":[22],"sort":[23],"order":[25],"encrypted":[27,137],"data":[28],"(e.g.,":[29],"range":[30,138],"queries":[31],"in":[32,56,124,162],"database)":[33],"efficiently.":[34],"In":[35],"this":[36],"paper,":[37],"we":[38,103],"study":[39],"OPE":[40,83,126],"for":[41,135],"more":[42],"practical":[43,57],"use.":[44],"We":[45,79],"first":[46],"discuss":[47],"elements":[49],"previous":[51,95],"schemes":[52,96],"considered":[53],"as":[54,74],"obstacles":[55],"and":[59,76,86,169],"propose":[60,80],"new":[62,82],"construction":[63],"by":[64,97,158],"eliminating":[65],"them":[66],"(especially":[67],"probabilistic":[68],"random":[69],"variate":[70],"generation":[71],"functions":[72],"such":[73],"hypergeometric":[75],"binomial":[77],"distributions).":[78],"whose":[84],"decryption":[87,107,112],"are":[88],"much":[89],"faster":[90],"than":[91],"those":[92],"employing":[98],"uniform":[99],"distribution":[100],"sampling.":[101],"Furthermore,":[102],"provide":[104],"batch":[106],"algorithm":[108],"support":[110],"concurrent":[111],"values":[115],"within":[116],"specific":[118],"range,":[119],"which":[120,165],"firstly":[122],"observed":[123],"research":[127],"literature.":[128],"can":[130],"be":[131],"very":[132],"efficiently":[133],"applied":[134],"query":[139],"processing":[140],"database":[142],"systems.":[143],"The":[144],"security":[145],"our":[147],"scheme":[148],"proven":[150],"under":[151],"weak":[153],"variants":[154],"notions":[156],"proposed":[157],"Teranishi":[159],"et":[160],"al.":[161],"Asiacrypt":[163],"2014,":[164],"yield":[166],"partial":[167],"indistinguishability":[168],"one-wayness.":[170]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
