{"id":"https://openalex.org/W2063575624","doi":"https://doi.org/10.1145/2810103.2813672","title":"GRECS","display_name":"GRECS","publication_year":2015,"publication_date":"2015-10-06","ids":{"openalex":"https://openalex.org/W2063575624","doi":"https://doi.org/10.1145/2810103.2813672","mag":"2063575624"},"language":"en","primary_location":{"id":"doi:10.1145/2810103.2813672","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019736242","display_name":"Xianrui Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Xianrui Meng","raw_affiliation_strings":["Boston University, Boston, MA, USA","Boston University , Boston , MA , USA"],"affiliations":[{"raw_affiliation_string":"Boston University, Boston, MA, USA","institution_ids":[]},{"raw_affiliation_string":"Boston University , Boston , MA , USA","institution_ids":["https://openalex.org/I111088046"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017613740","display_name":"Seny Kamara","orcid":null},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Seny Kamara","raw_affiliation_strings":["Microsoft Research, Redmond, WA, USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, WA, USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066000219","display_name":"Kobbi Nissim","orcid":"https://orcid.org/0000-0002-6632-8645"},"institutions":[{"id":"https://openalex.org/I124227911","display_name":"Ben-Gurion University of the Negev","ror":"https://ror.org/05tkyf982","country_code":"IL","type":"education","lineage":["https://openalex.org/I124227911"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Kobbi Nissim","raw_affiliation_strings":["Ben-Gurion University, CRCS Harvard University, Beer Sheva, Israel","Ben-Gurion University, CRCS Harvard University, Beer Sheva, Israel#TAB#"],"affiliations":[{"raw_affiliation_string":"Ben-Gurion University, CRCS Harvard University, Beer Sheva, Israel","institution_ids":["https://openalex.org/I124227911"]},{"raw_affiliation_string":"Ben-Gurion University, CRCS Harvard University, Beer Sheva, Israel#TAB#","institution_ids":["https://openalex.org/I124227911"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061270013","display_name":"George Kollios","orcid":"https://orcid.org/0009-0004-1837-8498"},"institutions":[{"id":"https://openalex.org/I111088046","display_name":"Boston University","ror":"https://ror.org/05qwgg493","country_code":"US","type":"education","lineage":["https://openalex.org/I111088046"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"George Kollios","raw_affiliation_strings":["Boston University, Boston, MA, USA","Boston University , Boston , MA , USA"],"affiliations":[{"raw_affiliation_string":"Boston University, Boston, MA, USA","institution_ids":[]},{"raw_affiliation_string":"Boston University , Boston , MA , USA","institution_ids":["https://openalex.org/I111088046"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5019736242"],"corresponding_institution_ids":["https://openalex.org/I111088046"],"apc_list":null,"apc_paid":null,"fwci":17.3602,"has_fulltext":false,"cited_by_count":132,"citation_normalized_percentile":{"value":0.99142983,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"504","last_page":"517"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7609735727310181},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7092304229736328},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6605633497238159},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5414085984230042},{"id":"https://openalex.org/keywords/probabilistic-encryption","display_name":"Probabilistic encryption","score":0.4852742850780487},{"id":"https://openalex.org/keywords/multiple-encryption","display_name":"Multiple encryption","score":0.43900009989738464},{"id":"https://openalex.org/keywords/communication-complexity","display_name":"Communication complexity","score":0.4234880805015564},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.41469722986221313},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.412345290184021},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4118642210960388},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.26214027404785156},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2270030975341797}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7609735727310181},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7092304229736328},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6605633497238159},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5414085984230042},{"id":"https://openalex.org/C54569210","wikidata":"https://www.wikidata.org/wiki/Q7246854","display_name":"Probabilistic encryption","level":3,"score":0.4852742850780487},{"id":"https://openalex.org/C184685986","wikidata":"https://www.wikidata.org/wiki/Q3505167","display_name":"Multiple encryption","level":3,"score":0.43900009989738464},{"id":"https://openalex.org/C179145077","wikidata":"https://www.wikidata.org/wiki/Q5154130","display_name":"Communication complexity","level":2,"score":0.4234880805015564},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.41469722986221313},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.412345290184021},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4118642210960388},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.26214027404785156},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2270030975341797}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2810103.2813672","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2810103.2813672","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4863694088","display_name":null,"funder_award_id":"IIS-1320542, CNS-1414119, CNS-1237235","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8389930651","display_name":null,"funder_award_id":"276/12","funder_id":"https://openalex.org/F4320322252","funder_display_name":"Israel Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320322252","display_name":"Israel Science Foundation","ror":"https://ror.org/04sazxf24"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W98478173","https://openalex.org/W119362848","https://openalex.org/W150223756","https://openalex.org/W1502708590","https://openalex.org/W1512819151","https://openalex.org/W1520270249","https://openalex.org/W1539859404","https://openalex.org/W1568804695","https://openalex.org/W1759364373","https://openalex.org/W1798609567","https://openalex.org/W1873763122","https://openalex.org/W1881831204","https://openalex.org/W1892798954","https://openalex.org/W1896160955","https://openalex.org/W1974729091","https://openalex.org/W1987634495","https://openalex.org/W1988374166","https://openalex.org/W1991514581","https://openalex.org/W1994924587","https://openalex.org/W1998091733","https://openalex.org/W2011212169","https://openalex.org/W2016575873","https://openalex.org/W2019384076","https://openalex.org/W2024197950","https://openalex.org/W2031533839","https://openalex.org/W2032186932","https://openalex.org/W2035825137","https://openalex.org/W2041416609","https://openalex.org/W2045446569","https://openalex.org/W2086763678","https://openalex.org/W2090914728","https://openalex.org/W2091208704","https://openalex.org/W2111446139","https://openalex.org/W2111708605","https://openalex.org/W2118446779","https://openalex.org/W2126425936","https://openalex.org/W2131043660","https://openalex.org/W2146828512","https://openalex.org/W2147929033","https://openalex.org/W2152516507","https://openalex.org/W2152590851","https://openalex.org/W2159394589","https://openalex.org/W2160459668","https://openalex.org/W2168729706","https://openalex.org/W2169861334","https://openalex.org/W2170616854","https://openalex.org/W2172107427","https://openalex.org/W2184702105","https://openalex.org/W2242625908","https://openalex.org/W3157578321","https://openalex.org/W4300349690","https://openalex.org/W6606067566","https://openalex.org/W6639476995","https://openalex.org/W6639805184"],"related_works":["https://openalex.org/W3040271687","https://openalex.org/W2564633714","https://openalex.org/W3181603331","https://openalex.org/W4243621294","https://openalex.org/W2955176453","https://openalex.org/W203043410","https://openalex.org/W2384237980","https://openalex.org/W3134652472","https://openalex.org/W4240313302","https://openalex.org/W2023390286"],"abstract_inverted_index":{"We":[0,67,153],"propose":[1,68],"graph":[2,25,36,61],"encryption":[3,37,83,114],"schemes":[4,84,168],"that":[5,85,166,177],"efficiently":[6],"support":[7],"approximate":[8,75],"shortest":[9],"distance":[10,17,77],"queries":[11,18],"on":[12],"large-scale":[13,43],"encrypted":[14,60],"graphs.":[15],"Shortest":[16,76],"are":[19,86,169],"one":[20],"of":[21,32,98,112,129,146,150,159],"the":[22,52,144,157],"most":[23],"fundamental":[24],"operations":[26],"and":[27,63,115,138,155,171,184],"have":[28],"a":[29,39,104,126,147],"wide":[30],"range":[31],"applications.":[33],"Using":[34],"such":[35],"schemes,":[38],"client":[40],"can":[41,172],"outsource":[42],"privacy-sensitive":[44],"graphs":[45,176],"to":[46,54,175,180],"an":[47],"untrusted":[48],"server":[49],"without":[50],"losing":[51],"ability":[53],"query":[55],"it.":[56],"Other":[57],"applications":[58],"include":[59],"databases":[62],"controlled":[64],"disclosure":[65],"systems.":[66],"GRECS":[69],"(stands":[70],"for":[71,74],"GRaph":[72],"EnCryption":[73],"queries)":[78],"which":[79],"includes":[80],"three":[81],"oracle":[82],"provably":[87],"secure":[88],"against":[89],"any":[90],"semi-honest":[91],"server.":[92],"Our":[93,107],"first":[94],"construction":[95],"makes":[96,110],"use":[97,111],"only":[99],"symmetric-key":[100],"operations,":[101],"resulting":[102],"in":[103],"computationally-efficient":[105,118,137],"construction.":[106],"second":[108],"scheme":[109,134],"somewhat-homomorphic":[113],"is":[116,135],"less":[117],"but":[119],"achieves":[120,139],"optimal":[121,140],"communication":[122,141],"complexity":[123,142],"(i.e.":[124],"uses":[125],"minimal":[127],"amount":[128,149],"bandwidth).":[130],"Finally,":[131],"our":[132,160,167],"third":[133],"both":[136],"at":[143],"cost":[145],"small":[148],"additional":[151],"leakage.":[152],"implemented":[154],"evaluated":[156],"efficiency":[158],"constructions":[161],"experimentally.":[162],"The":[163],"experiments":[164],"demonstrate":[165],"efficient":[170],"be":[173],"applied":[174],"scale":[178],"up":[179],"1.6":[181],"million":[182,186],"nodes":[183],"11":[185],"edges.":[187]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":12},{"year":2024,"cited_by_count":13},{"year":2023,"cited_by_count":9},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":13},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":26},{"year":2018,"cited_by_count":20},{"year":2017,"cited_by_count":11},{"year":2016,"cited_by_count":7}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2016-06-24T00:00:00"}
