{"id":"https://openalex.org/W2767202484","doi":"https://doi.org/10.1145/3133956.3134008","title":"Querying for Queries","display_name":"Querying for Queries","publication_year":2017,"publication_date":"2017-10-27","ids":{"openalex":"https://openalex.org/W2767202484","doi":"https://doi.org/10.1145/3133956.3134008","mag":"2767202484"},"language":"en","primary_location":{"id":"doi:10.1145/3133956.3134008","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5026555860","display_name":"Syed Mahbub Hafiz","orcid":null},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Syed Mahbub Hafiz","raw_affiliation_strings":["Indiana University, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5058723492","display_name":"Ryan Henry","orcid":"https://orcid.org/0000-0002-1142-4349"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ryan Henry","raw_affiliation_strings":["Indiana University, Bloomington, IN, USA"],"affiliations":[{"raw_affiliation_string":"Indiana University, Bloomington, IN, USA","institution_ids":["https://openalex.org/I4210119109"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5026555860"],"corresponding_institution_ids":["https://openalex.org/I4210119109"],"apc_list":null,"apc_paid":null,"fwci":0.5851,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.76389916,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1361","last_page":"1373"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8597085475921631},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.6640979647636414},{"id":"https://openalex.org/keywords/construct","display_name":"Construct (python library)","score":0.6461606621742249},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.6326417326927185},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.49813389778137207},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.4751843512058258},{"id":"https://openalex.org/keywords/fetch","display_name":"Fetch","score":0.4502151608467102},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.42285627126693726},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.41191157698631287},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.40917423367500305},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.21898123621940613},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09264612197875977}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8597085475921631},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.6640979647636414},{"id":"https://openalex.org/C2780801425","wikidata":"https://www.wikidata.org/wiki/Q5164392","display_name":"Construct (python library)","level":2,"score":0.6461606621742249},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.6326417326927185},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.49813389778137207},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.4751843512058258},{"id":"https://openalex.org/C131918245","wikidata":"https://www.wikidata.org/wiki/Q1409090","display_name":"Fetch","level":2,"score":0.4502151608467102},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42285627126693726},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.41191157698631287},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.40917423367500305},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.21898123621940613},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09264612197875977},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3133956.3134008","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3133956.3134008","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17","score":0.4099999964237213}],"awards":[{"id":"https://openalex.org/G7887161388","display_name":null,"funder_award_id":"1718475","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W644599125","https://openalex.org/W1498685334","https://openalex.org/W1515386533","https://openalex.org/W1619839175","https://openalex.org/W1962818100","https://openalex.org/W2085106103","https://openalex.org/W2105037262","https://openalex.org/W2134698082","https://openalex.org/W2141420453","https://openalex.org/W2148575324","https://openalex.org/W2157100124","https://openalex.org/W2158474152","https://openalex.org/W2396392723","https://openalex.org/W2489433463","https://openalex.org/W2497191804","https://openalex.org/W2533357737","https://openalex.org/W2604973422","https://openalex.org/W2794852379","https://openalex.org/W2963289406","https://openalex.org/W3100195636","https://openalex.org/W4378527334","https://openalex.org/W6667861895","https://openalex.org/W6683621135","https://openalex.org/W6736412764"],"related_works":["https://openalex.org/W4214970455","https://openalex.org/W2175646991","https://openalex.org/W2027386296","https://openalex.org/W2614583728","https://openalex.org/W2138256251","https://openalex.org/W1910690003","https://openalex.org/W2128177192","https://openalex.org/W2068882541","https://openalex.org/W2142694456","https://openalex.org/W1999817486"],"abstract_inverted_index":{"We":[0,147],"propose":[1],"indexes":[2,78],"of":[3,37,79,132,141,160],"queries,":[4],"a":[5],"novel":[6],"mechanism":[7],"for":[8,31,92,124,177,184],"supporting":[9],"efficient,":[10],"expressive,":[11],"and":[12,130,188],"information-theoretically":[13],"private":[14,178,185],"single-round":[15],"queries":[16,50,61,80,89],"over":[17],"multi-server":[18],"PIR":[19,88,117],"databases.":[20],"Our":[21,110,164],"approach":[22,112],"decouples":[23],"the":[24,34,38,120,127,168],"way":[25],"that":[26,51,62,167],"users":[27,44],"construct":[28],"their":[29],"requests":[30],"data":[32,40,47,54,66],"from":[33],"physical":[35],"layout":[36],"remote":[39],"store,":[41],"thereby":[42],"enabling":[43],"to":[45,59,68,81,155],"fetch":[46,84],"using":[48],"\"contextual\"":[49],"specify":[52,63],"which":[53],"they":[55],"seek,":[56],"as":[57,91,152],"opposed":[58],"\"positional\"":[60],"where":[64],"those":[65],"happen":[67],"reside.":[69],"For":[70],"example,":[71],"an":[72,153,157],"open-access":[73],"eprint":[74],"repository":[75],"could":[76],"employ":[77],"let":[82],"researchers":[83],"academic":[85],"articles":[86],"via":[87],"such":[90],"\"this":[93],"year's":[94],"5":[95],"most":[96,104,128],"cited":[97],"papers":[98,107],"about":[99,108],"PIR\"":[100],"or":[101],"\"the":[102],"3":[103],"recently":[105],"posted":[106],"PIR\".":[109],"basic":[111],"is":[113],"compatible":[114],"with":[115],"any":[116],"protocol":[118,144],"in":[119],"ubiquitous":[121],"\"vector-matrix\"":[122],"model":[123],"PIR,":[125],"though":[126],"sophisticated":[129],"useful":[131],"our":[133,150],"constructions":[134],"rely":[135],"on":[136],"some":[137],"nice":[138],"algebraic":[139],"properties":[140],"Goldberg's":[142,161],"IT-PIR":[143,162],"(Oakland":[145],"2007).":[146],"have":[148],"implemented":[149],"techniques":[151,170],"extension":[154],"Percy++,":[156],"open-source":[158],"implementation":[159],"protocol.":[163],"experiments":[165],"indicate":[166],"new":[169],"can":[171],"greatly":[172],"improve":[173],"not":[174],"only":[175],"utility":[176],"information":[179,186],"retrievers":[180,187],"but":[181],"also":[182],"efficiency":[183],"servers":[189],"alike.":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
