{"id":"https://openalex.org/W4284707380","doi":"https://doi.org/10.1145/3532640.3532644","title":"Efficient Authentication Processing for Spatial Keyword Queries in Hybrid Storage Blockchain","display_name":"Efficient Authentication Processing for Spatial Keyword Queries in Hybrid Storage Blockchain","publication_year":2022,"publication_date":"2022-03-25","ids":{"openalex":"https://openalex.org/W4284707380","doi":"https://doi.org/10.1145/3532640.3532644"},"language":"en","primary_location":{"id":"doi:10.1145/3532640.3532644","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3532640.3532644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2022 4th International Conference on Blockchain Technology","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100407919","display_name":"Xu Wang","orcid":"https://orcid.org/0000-0002-9748-0359"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xu Wang","raw_affiliation_strings":["Beijing Institute of Technology, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061240612","display_name":"Zhiwei Zhang","orcid":"https://orcid.org/0000-0003-3482-6831"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiwei Zhang","raw_affiliation_strings":["Beijing Institute of Technology, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079763362","display_name":"Xiaochun Yang","orcid":"https://orcid.org/0000-0002-6184-4771"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaochun Yang","raw_affiliation_strings":["Northeastern University, China"],"affiliations":[{"raw_affiliation_string":"Northeastern University, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054991337","display_name":"Guoren Wang","orcid":"https://orcid.org/0000-0002-0181-8379"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guoren Wang","raw_affiliation_strings":["Beijing Institute of Technology, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025469862","display_name":"Aoqian Zhang","orcid":"https://orcid.org/0000-0003-4059-6913"},"institutions":[{"id":"https://openalex.org/I125839683","display_name":"Beijing Institute of Technology","ror":"https://ror.org/01skt4w74","country_code":"CN","type":"education","lineage":["https://openalex.org/I125839683","https://openalex.org/I890469752"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Aoqian Zhang","raw_affiliation_strings":["Beijing Institute of Technology, China"],"affiliations":[{"raw_affiliation_string":"Beijing Institute of Technology, China","institution_ids":["https://openalex.org/I125839683"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5029556362","display_name":"George Xianzhi Yuan","orcid":"https://orcid.org/0000-0001-6186-9162"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"George Yuan","raw_affiliation_strings":["Thinvent Digital Technology Co.,Ltd, China"],"affiliations":[{"raw_affiliation_string":"Thinvent Digital Technology Co.,Ltd, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100407919"],"corresponding_institution_ids":["https://openalex.org/I125839683"],"apc_list":null,"apc_paid":null,"fwci":0.2972,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.49249958,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"22","last_page":"30"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8545485734939575},{"id":"https://openalex.org/keywords/soundness","display_name":"Soundness","score":0.5528820157051086},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5415269732475281},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5212926864624023},{"id":"https://openalex.org/keywords/object-storage","display_name":"Object storage","score":0.5127331018447876},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4878115952014923},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.44963547587394714},{"id":"https://openalex.org/keywords/merkle-tree","display_name":"Merkle tree","score":0.44277510046958923},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4195959270000458},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4008171558380127},{"id":"https://openalex.org/keywords/computer-data-storage","display_name":"Computer data storage","score":0.3750758767127991},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3690437078475952},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35746151208877563},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.20950081944465637},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.18594759702682495},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.16302740573883057}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8545485734939575},{"id":"https://openalex.org/C39920170","wikidata":"https://www.wikidata.org/wiki/Q693083","display_name":"Soundness","level":2,"score":0.5528820157051086},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5415269732475281},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5212926864624023},{"id":"https://openalex.org/C56640594","wikidata":"https://www.wikidata.org/wiki/Q7075068","display_name":"Object storage","level":3,"score":0.5127331018447876},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4878115952014923},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.44963547587394714},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.44277510046958923},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4195959270000458},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4008171558380127},{"id":"https://openalex.org/C194739806","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Computer data storage","level":2,"score":0.3750758767127991},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3690437078475952},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35746151208877563},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.20950081944465637},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.18594759702682495},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.16302740573883057},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3532640.3532644","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3532640.3532644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 2022 4th International Conference on Blockchain Technology","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.4300000071525574,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1852700332","https://openalex.org/W2006307108","https://openalex.org/W2071898519","https://openalex.org/W2106011067","https://openalex.org/W2109549608","https://openalex.org/W2112129327","https://openalex.org/W2140048308","https://openalex.org/W2162319779","https://openalex.org/W2544710688","https://openalex.org/W2753962503","https://openalex.org/W2790225875","https://openalex.org/W2889752785","https://openalex.org/W2903368601","https://openalex.org/W2944664110","https://openalex.org/W2944812228","https://openalex.org/W2948269220","https://openalex.org/W2952570284","https://openalex.org/W2956900752","https://openalex.org/W2970352341","https://openalex.org/W2971147021","https://openalex.org/W3029785470","https://openalex.org/W3151748982","https://openalex.org/W3176377144","https://openalex.org/W4235998504","https://openalex.org/W4248175462","https://openalex.org/W6633819675","https://openalex.org/W6676873013"],"related_works":["https://openalex.org/W2080470135","https://openalex.org/W2378855816","https://openalex.org/W4327907098","https://openalex.org/W2370205011","https://openalex.org/W2021496484","https://openalex.org/W4200525460","https://openalex.org/W1546463374","https://openalex.org/W3091659290","https://openalex.org/W2548311765","https://openalex.org/W1516720694"],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"has":[2],"emerged":[3],"as":[4],"a":[5,23,29,79,126,130],"promising":[6],"solution":[7],"for":[8,14,71],"secure":[9],"data":[10,42,59,82],"storage":[11,31,48],"and":[12,39,61,67,89,108,129,137],"retrieval":[13],"decentralized":[15],"applications.":[16],"To":[17],"scale":[18],"up":[19],"the":[20,40,58,64,68,87,96,102,113,120,144,154,157],"blockchain":[21],"services,":[22],"common":[24],"approach":[25],"is":[26],"to":[27,45,56,77,85,142,153],"employ":[28],"hybrid":[30],"architecture,":[32],"where":[33],"only":[34],"meta-data":[35],"are":[36,43,140],"stored":[37],"on-chain":[38,60,107],"raw":[41],"outsourced":[44],"an":[46],"off-chain":[47,62,109],"service":[49],"provider.":[50],"In":[51,91],"this":[52,92],"scenario,":[53],"users":[54],"need":[55],"query":[57,72],"at":[63],"same":[65],"time,":[66],"key":[69],"issue":[70],"processing":[73],"would":[74],"be":[75],"how":[76],"design":[78],"gas-efficient":[80],"authenticated":[81],"structure":[83],"(ADS)":[84],"guarantee":[86],"completeness":[88],"soundness.":[90],"paper,":[93],"we":[94],"study":[95],"spatial":[97],"keyword":[98],"authentication":[99],"queries":[100],"in":[101],"hybrid-storage":[103],"blockchain,":[104],"which":[105,116],"includes":[106],"storage.":[110],"We":[111],"propose":[112],"GEMIR-tree":[114,159],"index,":[115],"can":[117,161],"significantly":[118],"reduce":[119,163],"cost":[121],"of":[122,132,146],"maintenance":[123],"by":[124],"combing":[125],"single":[127],"MIR-tree":[128],"series":[131],"SMIR":[133],"trees.":[134],"Theoretical":[135],"analysis":[136],"empirical":[138],"evaluation":[139],"conducted":[141],"validate":[143],"performance":[145],"GEMIR-tree.":[147],"Experimental":[148],"results":[149],"show":[150],"that,":[151],"compared":[152],"baseline":[155],"solution,":[156],"proposed":[158],"index":[160],"efficiently":[162],"gas":[164],"cost.":[165]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
