{"id":"https://openalex.org/W2909063002","doi":"https://doi.org/10.1145/3287624.3287699","title":"Towards practical homomorphic email filtering","display_name":"Towards practical homomorphic email filtering","publication_year":2019,"publication_date":"2019-01-18","ids":{"openalex":"https://openalex.org/W2909063002","doi":"https://doi.org/10.1145/3287624.3287699","mag":"2909063002"},"language":"en","primary_location":{"id":"doi:10.1145/3287624.3287699","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3287624.3287699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065421587","display_name":"Song Bian","orcid":"https://orcid.org/0000-0003-0467-6203"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Song Bian","raw_affiliation_strings":["Kyoto University"],"affiliations":[{"raw_affiliation_string":"Kyoto University","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033255199","display_name":"Masayuki Hiromoto","orcid":null},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Masayuki Hiromoto","raw_affiliation_strings":["Kyoto University"],"affiliations":[{"raw_affiliation_string":"Kyoto University","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017861176","display_name":"Takashi Sat\u014d","orcid":"https://orcid.org/0000-0002-1577-8259"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Takashi Sato","raw_affiliation_strings":["Kyoto University"],"affiliations":[{"raw_affiliation_string":"Kyoto University","institution_ids":["https://openalex.org/I22299242"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5065421587"],"corresponding_institution_ids":["https://openalex.org/I22299242"],"apc_list":null,"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.53298493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"621","last_page":"626"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.8725460767745972},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7665294408798218},{"id":"https://openalex.org/keywords/application-specific-integrated-circuit","display_name":"Application-specific integrated circuit","score":0.6425411105155945},{"id":"https://openalex.org/keywords/homomorphism","display_name":"Homomorphism","score":0.6049695014953613},{"id":"https://openalex.org/keywords/software-implementation","display_name":"Software implementation","score":0.5208085775375366},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4835750460624695},{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.46611741185188293},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4397292733192444},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4265744686126709},{"id":"https://openalex.org/keywords/paillier-cryptosystem","display_name":"Paillier cryptosystem","score":0.4117792248725891},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.39611151814460754},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.35564178228378296},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.3435165584087372},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3296055793762207},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3205012083053589},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14525526762008667},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1377221643924713},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.11573615670204163},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.11132636666297913},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.0884922444820404}],"concepts":[{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.8725460767745972},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7665294408798218},{"id":"https://openalex.org/C77390884","wikidata":"https://www.wikidata.org/wiki/Q217302","display_name":"Application-specific integrated circuit","level":2,"score":0.6425411105155945},{"id":"https://openalex.org/C4042151","wikidata":"https://www.wikidata.org/wiki/Q215111","display_name":"Homomorphism","level":2,"score":0.6049695014953613},{"id":"https://openalex.org/C2983609787","wikidata":"https://www.wikidata.org/wiki/Q10534782","display_name":"Software implementation","level":3,"score":0.5208085775375366},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4835750460624695},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.46611741185188293},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4397292733192444},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4265744686126709},{"id":"https://openalex.org/C66989864","wikidata":"https://www.wikidata.org/wiki/Q594646","display_name":"Paillier cryptosystem","level":5,"score":0.4117792248725891},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.39611151814460754},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.35564178228378296},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.3435165584087372},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3296055793762207},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3205012083053589},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14525526762008667},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1377221643924713},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.11573615670204163},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.11132636666297913},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.0884922444820404},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3287624.3287699","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3287624.3287699","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 24th Asia and South Pacific Design Automation Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320309545","display_name":"Synopsys","ror":"https://ror.org/013by2m91"},{"id":"https://openalex.org/F4320322832","display_name":"University of Tokyo","ror":"https://ror.org/057zh3y96"},{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W36213310","https://openalex.org/W110839122","https://openalex.org/W2031738616","https://openalex.org/W2038761522","https://openalex.org/W2088925378","https://openalex.org/W2131524998","https://openalex.org/W2132172731","https://openalex.org/W2160536005","https://openalex.org/W2161214567","https://openalex.org/W2165464232","https://openalex.org/W2278677564","https://openalex.org/W2295445672","https://openalex.org/W2404098708","https://openalex.org/W2612769338","https://openalex.org/W2953290839","https://openalex.org/W3029884494","https://openalex.org/W6683799570","https://openalex.org/W6683971644"],"related_works":["https://openalex.org/W4296239811","https://openalex.org/W4386820853","https://openalex.org/W4390887375","https://openalex.org/W2094069016","https://openalex.org/W4212859770","https://openalex.org/W3036675567","https://openalex.org/W2955273252","https://openalex.org/W2518050971","https://openalex.org/W1484081998","https://openalex.org/W1507098372"],"abstract_inverted_index":{"A":[0],"secure":[1],"version":[2],"of":[3,40,100],"the":[4,23,27,37,44,56,69,80,101],"na\u00efve":[5],"Bayesian":[6],"filter":[7],"(NBF)":[8],"is":[9,87],"proposed":[10],"utilizing":[11],"partially":[12],"homomorphic":[13],"encryption":[14],"(PHE)":[15],"scheme.":[16],"SNBF":[17,48],"can":[18],"be":[19],"implemented":[20,47],"with":[21,74],"only":[22],"additive":[24],"homomorphism":[25],"from":[26],"Paillier":[28],"system,":[29],"and":[30,52],"we":[31,46,61],"derive":[32],"new":[33],"techniques":[34],"to":[35,55,89,106],"reduce":[36],"computational":[38],"cost":[39],"PHE-based":[41],"SNBF.":[42],"In":[43],"experiment,":[45],"both":[49],"in":[50,68,94],"software":[51],"hardware.":[53],"Compared":[54],"best":[57],"existing":[58],"PHE":[59],"scheme,":[60],"achieved":[62],"1,200x":[63],"(resp.,":[64,71],"398,840x)":[65],"runtime":[66],"reduction":[67,78],"CPU":[70],"ASIC)":[72],"implementations,":[73],"additional":[75],"1,919x":[76],"power":[77],"on":[79],"designated":[81],"hardware":[82,85],"multiplier.":[83],"Our":[84],"implementation":[86],"able":[88],"classify":[90],"an":[91],"average-length":[92],"email":[93],"0.5":[95],"s,":[96],"making":[97],"it":[98],"one":[99],"most":[102],"practical":[103],"NBF":[104],"schemes":[105],"date.":[107]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
