{"id":"https://openalex.org/W4405184814","doi":"https://doi.org/10.1145/3658644.3690377","title":"Scalable Equi-Join Queries over Encrypted Database","display_name":"Scalable Equi-Join Queries over Encrypted Database","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405184814","doi":"https://doi.org/10.1145/3658644.3690377"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3690377","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690377","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690377","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690377","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103451458","display_name":"Kai Du","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Kai Du","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100358500","display_name":"Jianfeng Wang","orcid":"https://orcid.org/0000-0001-5297-0293"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jianfeng Wang","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056665533","display_name":"Jiaojiao Wu","orcid":"https://orcid.org/0000-0002-3551-7152"},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaojiao Wu","raw_affiliation_strings":["School of Cyber Engineering, Xidian University, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Engineering, Xidian University, Xi'an, China","institution_ids":["https://openalex.org/I149594827"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037694066","display_name":"Yunling Wang","orcid":"https://orcid.org/0000-0001-6561-2540"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yunling Wang","raw_affiliation_strings":["School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Xi'an University of Posts &amp; Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103451458"],"corresponding_institution_ids":["https://openalex.org/I149594827"],"apc_list":null,"apc_paid":null,"fwci":2.1431,"has_fulltext":true,"cited_by_count":6,"citation_normalized_percentile":{"value":0.8963855,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"4002","last_page":"4016"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/joins","display_name":"Joins","score":0.746677815914154},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7262665629386902},{"id":"https://openalex.org/keywords/join","display_name":"Join (topology)","score":0.7172940969467163},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5679953694343567},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5674678087234497},{"id":"https://openalex.org/keywords/hash-join","display_name":"Hash join","score":0.55679851770401},{"id":"https://openalex.org/keywords/sort-merge-join","display_name":"Sort-merge join","score":0.5545220375061035},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5409877896308899},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4290924668312073},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.37062662839889526},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.20846012234687805},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.17471519112586975},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.09206777811050415}],"concepts":[{"id":"https://openalex.org/C2778692605","wikidata":"https://www.wikidata.org/wiki/Q4041866","display_name":"Joins","level":2,"score":0.746677815914154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7262665629386902},{"id":"https://openalex.org/C2776124973","wikidata":"https://www.wikidata.org/wiki/Q3183033","display_name":"Join (topology)","level":2,"score":0.7172940969467163},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5679953694343567},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5674678087234497},{"id":"https://openalex.org/C188805328","wikidata":"https://www.wikidata.org/wiki/Q4060691","display_name":"Hash join","level":3,"score":0.55679851770401},{"id":"https://openalex.org/C203570394","wikidata":"https://www.wikidata.org/wiki/Q4060688","display_name":"Sort-merge join","level":3,"score":0.5545220375061035},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5409877896308899},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4290924668312073},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.37062662839889526},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.20846012234687805},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.17471519112586975},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.09206777811050415},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3690377","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690377","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690377","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3690377","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3690377","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3690377","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1121271761","display_name":null,"funder_award_id":"Program","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2802911279","display_name":null,"funder_award_id":"Young","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3014332738","display_name":null,"funder_award_id":"2022KWZ-01","funder_id":"https://openalex.org/F4320336350","funder_display_name":"Key Research and Development Projects of Shaanxi Province"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G391238517","display_name":null,"funder_award_id":", and","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5939423041","display_name":null,"funder_award_id":"Technology","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6305732765","display_name":null,"funder_award_id":"62102313","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6328498802","display_name":null,"funder_award_id":"62072357","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7608752429","display_name":null,"funder_award_id":"Talent","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8255934405","display_name":null,"funder_award_id":"202301","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G8375279028","display_name":null,"funder_award_id":"2022YFB3102400","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320336350","display_name":"Key Research and Development Projects of Shaanxi Province","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405184814.pdf","grobid_xml":"https://content.openalex.org/works/W4405184814.grobid-xml"},"referenced_works_count":14,"referenced_works":["https://openalex.org/W2030888439","https://openalex.org/W2043508455","https://openalex.org/W2146828512","https://openalex.org/W2639926268","https://openalex.org/W2765463836","https://openalex.org/W2952698068","https://openalex.org/W2984157150","https://openalex.org/W2994941531","https://openalex.org/W3011810846","https://openalex.org/W3134573374","https://openalex.org/W3172850950","https://openalex.org/W4283380702","https://openalex.org/W4405184814","https://openalex.org/W6681471418"],"related_works":["https://openalex.org/W2381211091","https://openalex.org/W2091359263","https://openalex.org/W4283362132","https://openalex.org/W4234452035","https://openalex.org/W2469706965","https://openalex.org/W4205996836","https://openalex.org/W1866159721","https://openalex.org/W2126624503","https://openalex.org/W3086237447","https://openalex.org/W1966967794"],"abstract_inverted_index":{"Secure":[0],"join":[1,27,43,54,73,86,156],"queries":[2,28,44,124],"over":[3,45,65,130],"encrypted":[4,30,49,131],"databases,":[5],"the":[6,72,82,90,108,121,172,175,190],"most":[7],"expressive":[8],"class":[9],"of":[10,79,110,139,178,199,219,231],"SQL":[11],"queries,":[12],"have":[13],"attracted":[14],"extensive":[15],"attention":[16],"recently.":[17],"The":[18,193],"state-of-the-art":[19,191],"JXT":[20,39,80,153,205],"(Jutla":[21],"et":[22],"al.":[23],"ASIACRYPT":[24],"2022)":[25],"enables":[26],"on":[29,165],"relational":[31],"databases":[32,132],"without":[33,133],"pre-computing":[34],"all":[35,143],"possible":[36],"joins.":[37],"However,":[38],"can":[40,147,161],"merely":[41],"support":[42],"two":[46,66,114],"tables":[47,67,115,129],"(in":[48],"databases)":[50],"with":[51,75,189],"some":[52],"high-entropy":[53,155],"attributes.":[55,87,157],"In":[56,158,211],"this":[57],"paper,":[58],"we":[59,118,182],"propose":[60],"an":[61],"equi-join":[62,123],"query":[63,91],"protocol":[64],"dubbed":[68],"JXT+,":[69],"that":[70,197],"allows":[71],"attributes":[74,144],"arbitrary":[76,140],"names":[77],"instead":[78],"requiring":[81],"identical":[83],"name":[84],"for":[85,150],"JXT+":[88,213],"reduces":[89],"complexity":[92],"from":[93,174],"O(\\ell_1":[94],"\\cdot":[95],"\\ell_2)":[96],"to":[97,101,204],"O(\\ell_1)":[98],"as":[99],"compared":[100],"JXT,":[102],"where":[103],"\\ell_1":[104],"and":[105,184,208,227],"\\ell_2":[106],"denote":[107],"numbers":[109],"matching":[111,176],"records":[112,177],"in":[113,206,223,235],"respectively.":[116],"Furthermore,":[117],"present":[119],"JXT++,":[120],"first":[122],"across":[125],"three":[126,166],"or":[127,167],"more":[128,168],"pre-computation.":[134],"Specifically,":[135],"JXT++":[136,160],"supports":[137],"joins":[138],"attributes,":[141],"i.e.,":[142],"(even":[145],"low-entropy)":[146],"be":[148],"candidates":[149],"join,":[151],"while":[152],"requires":[154],"addition,":[159],"alleviate":[162],"sub-query":[163],"leakage":[164,173],"tables,":[169],"which":[170],"hides":[171],"two-table":[179],"join.":[180],"Finally,":[181],"implement":[183],"compare":[185],"our":[186,200],"proposed":[187],"schemes":[188,201],"JXT.":[192],"experimental":[194],"results":[195],"demonstrate":[196],"both":[198],"are":[202],"superior":[203],"search":[207,236],"storage":[209,225],"costs.":[210],"particular,":[212],"(resp.,":[214,221,233],"JXT++)":[215],"brings":[216],"a":[217,229],"saving":[218],"49%":[220],"68%)":[222],"server":[224],"cost":[226],"achieves":[228],"speedup":[230],"51.7\u00d7":[232],"54.3\u00d7)":[234],"latency.":[237]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-18T14:38:29.013473","created_date":"2025-10-10T00:00:00"}
