{"id":"https://openalex.org/W3110442150","doi":"https://doi.org/10.1155/2020/8859213","title":"Privacy-Preserving Graph Operations for Mobile Authentication","display_name":"Privacy-Preserving Graph Operations for Mobile Authentication","publication_year":2020,"publication_date":"2020-11-22","ids":{"openalex":"https://openalex.org/W3110442150","doi":"https://doi.org/10.1155/2020/8859213","mag":"3110442150"},"language":"en","primary_location":{"id":"doi:10.1155/2020/8859213","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8859213","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8859213.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/wcmc/2020/8859213.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100458010","display_name":"Peng Li","orcid":"https://orcid.org/0000-0001-8841-7609"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]},{"id":"https://openalex.org/I9564693","display_name":"Eastern Liaoning University","ror":"https://ror.org/01a4wvs18","country_code":"CN","type":"education","lineage":["https://openalex.org/I9564693"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Peng Li","raw_affiliation_strings":["School of Information Engineering, Eastern Liaoning University, China","Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"School of Information Engineering, Eastern Liaoning University, China","institution_ids":["https://openalex.org/I9564693"]},{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101669124","display_name":"Fucai Zhou","orcid":"https://orcid.org/0000-0003-2667-6853"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fucai Zhou","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103008969","display_name":"Zifeng Xu","orcid":"https://orcid.org/0000-0001-5564-2770"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zifeng Xu","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100674055","display_name":"Yuxi Li","orcid":"https://orcid.org/0000-0002-6697-1796"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuxi Li","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5085728168","display_name":"Jian Xu","orcid":"https://orcid.org/0000-0001-5590-8540"},"institutions":[{"id":"https://openalex.org/I9224756","display_name":"Northeastern University","ror":"https://ror.org/03awzbc87","country_code":"CN","type":"education","lineage":["https://openalex.org/I9224756"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Xu","raw_affiliation_strings":["Software College, Northeastern University, Shenyang, China"],"affiliations":[{"raw_affiliation_string":"Software College, Northeastern University, Shenyang, China","institution_ids":["https://openalex.org/I9224756"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101669124"],"corresponding_institution_ids":["https://openalex.org/I9224756"],"apc_list":{"value":2300,"currency":"USD","value_usd":2300},"apc_paid":{"value":2300,"currency":"USD","value_usd":2300},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.16616312,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9958000183105469,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8995673060417175},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7608150243759155},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5941001176834106},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5204265713691711},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5055768489837646},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.48064175248146057},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4410875141620636},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.43966346979141235},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2720109820365906},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.097463458776474}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8995673060417175},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7608150243759155},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5941001176834106},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5204265713691711},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5055768489837646},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.48064175248146057},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4410875141620636},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.43966346979141235},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2720109820365906},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.097463458776474}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1155/2020/8859213","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8859213","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8859213.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:bc6dd6a5069241d9b35a522fd91270a3","is_oa":true,"landing_page_url":"https://doaj.org/article/bc6dd6a5069241d9b35a522fd91270a3","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Wireless Communications and Mobile Computing, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:hindawi.com:10.1155/2020/8859213","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/8859213","pdf_url":null,"source":{"id":"https://openalex.org/S4306400340","display_name":"Hindawi Journal of Chemistry (Hindawi)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210126990","host_organization_name":"Hindawi (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210126990"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Research Article"}],"best_oa_location":{"id":"doi:10.1155/2020/8859213","is_oa":true,"landing_page_url":"http://doi.org/10.1155/2020/8859213","pdf_url":"https://downloads.hindawi.com/journals/wcmc/2020/8859213.pdf","source":{"id":"https://openalex.org/S235346","display_name":"Wireless Communications and Mobile Computing","issn_l":"1530-8669","issn":["1530-8669","1530-8677"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Wireless Communications and Mobile Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6200000047683716}],"awards":[{"id":"https://openalex.org/G191980358","display_name":null,"funder_award_id":"201701","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G2087396116","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G2376276132","display_name":null,"funder_award_id":"China","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G3317480652","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3465622734","display_name":null,"funder_award_id":"N2017012","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G5219932531","display_name":null,"funder_award_id":"201701","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5994120800","display_name":null,"funder_award_id":"Natural","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6805414796","display_name":null,"funder_award_id":"61872069","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8645500771","display_name":null,"funder_award_id":"61872069","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3110442150.pdf","grobid_xml":"https://content.openalex.org/works/W3110442150.grobid-xml"},"referenced_works_count":35,"referenced_works":["https://openalex.org/W1967308747","https://openalex.org/W2009033060","https://openalex.org/W2054857924","https://openalex.org/W2130426318","https://openalex.org/W2131829632","https://openalex.org/W2132172731","https://openalex.org/W2143087446","https://openalex.org/W2196528695","https://openalex.org/W2293238400","https://openalex.org/W2588626627","https://openalex.org/W2618387693","https://openalex.org/W2625100490","https://openalex.org/W2740956138","https://openalex.org/W2766393794","https://openalex.org/W2768696376","https://openalex.org/W2774184031","https://openalex.org/W2782492233","https://openalex.org/W2799341537","https://openalex.org/W2803553469","https://openalex.org/W2906140151","https://openalex.org/W2906896490","https://openalex.org/W2919782006","https://openalex.org/W2945531951","https://openalex.org/W2949735646","https://openalex.org/W2954005977","https://openalex.org/W2962692592","https://openalex.org/W2972714212","https://openalex.org/W2990399857","https://openalex.org/W3005206852","https://openalex.org/W3008439638","https://openalex.org/W3100848837","https://openalex.org/W3104090836","https://openalex.org/W3141585064","https://openalex.org/W6633757134","https://openalex.org/W6673580112"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W4256358502","https://openalex.org/W2625655658","https://openalex.org/W2771047361"],"abstract_inverted_index":{"Along":[0],"with":[1],"the":[2,23,85,103,111,114,123],"fast":[3],"development":[4],"of":[5,15,22,89,110,125],"wireless":[6],"technologies,":[7],"smart":[8,31,38,72],"devices":[9,32,39],"have":[10,42],"become":[11],"an":[12],"integral":[13],"part":[14],"our":[16,126],"daily":[17],"life.":[18],"Authentication":[19],"is":[20],"one":[21],"most":[24],"common":[25],"and":[26,46,87,105,121],"effective":[27],"methods":[28],"for":[29,68,71],"these":[30],"to":[33,41,82,98],"prevent":[34,99],"unauthorized":[35],"access.":[36],"Moreover,":[37],"tend":[40],"limited":[43],"computing":[44],"power,":[45],"they":[47],"may":[48],"possess":[49],"sensitive":[50],"data.":[51,133],"In":[52],"this":[53],"paper,":[54],"we":[55,106,119],"investigate":[56],"performing":[57],"graph":[58,132],"operations":[59],"in":[60,113],"a":[61],"privacy-preserving":[62],"manner,":[63],"which":[64],"can":[65],"be":[66],"used":[67],"anonymous":[69],"authentication":[70],"devices.":[73],"We":[74],"propose":[75],"two":[76,80],"protocols":[77,94,112,127],"that":[78],"allow":[79],"parties":[81],"jointly":[83],"compute":[84],"intersection":[86],"union":[88],"their":[90],"private":[91],"graphs.":[92],"Our":[93],"utilize":[95],"homomorphic":[96],"encryption":[97],"information":[100],"leakage":[101],"during":[102],"process,":[104],"provide":[107],"security":[108],"proofs":[109],"semihonest":[115],"setting.":[116],"At":[117],"last,":[118],"implement":[120],"evaluate":[122],"efficiency":[124],"through":[128],"experiments":[129],"on":[130],"real-world":[131]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
