{"id":"https://openalex.org/W7118131878","doi":"https://doi.org/10.1186/s42400-025-00533-8","title":"SecOutPIR: privacy preservation for data owner and access control for data user in outsourced private information retrieval","display_name":"SecOutPIR: privacy preservation for data owner and access control for data user in outsourced private information retrieval","publication_year":2026,"publication_date":"2026-01-04","ids":{"openalex":"https://openalex.org/W7118131878","doi":"https://doi.org/10.1186/s42400-025-00533-8"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00533-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00533-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00533-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00533-8.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101921142","display_name":"Fei Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Fei Tang","raw_affiliation_strings":["School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Ministry of Education, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Ministry of Education, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121909592","display_name":"Ruixue Li","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ruixue Li","raw_affiliation_strings":["School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Security and Information Law, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101011322","display_name":"Huihui Zhu","orcid":"https://orcid.org/0009-0006-5701-1837"},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huihui Zhu","raw_affiliation_strings":["School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121888722","display_name":"Mingjie Han","orcid":null},"institutions":[{"id":"https://openalex.org/I10535382","display_name":"Chongqing University of Posts and Telecommunications","ror":"https://ror.org/03dgaqz26","country_code":"CN","type":"education","lineage":["https://openalex.org/I10535382"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingjie Han","raw_affiliation_strings":["School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Chongqing University of Posts and Telecommunications, Chongqing, 400065, China","institution_ids":["https://openalex.org/I10535382"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5101921142"],"corresponding_institution_ids":["https://openalex.org/I10535382"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02956865,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"9","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8848999738693237,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.8848999738693237,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.08179999887943268,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.0035000001080334187,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.6337000131607056},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5813999772071838},{"id":"https://openalex.org/keywords/identifier","display_name":"Identifier","score":0.5550000071525574},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.5527999997138977},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5489000082015991},{"id":"https://openalex.org/keywords/data-retrieval","display_name":"Data retrieval","score":0.5347999930381775},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.48750001192092896},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.48249998688697815},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4203000068664551}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7996000051498413},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.6337000131607056},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5813999772071838},{"id":"https://openalex.org/C154504017","wikidata":"https://www.wikidata.org/wiki/Q853614","display_name":"Identifier","level":2,"score":0.5550000071525574},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.5527999997138977},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5489000082015991},{"id":"https://openalex.org/C551230270","wikidata":"https://www.wikidata.org/wiki/Q4368942","display_name":"Data retrieval","level":2,"score":0.5347999930381775},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.48750001192092896},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.48249998688697815},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45910000801086426},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4203000068664551},{"id":"https://openalex.org/C47487241","wikidata":"https://www.wikidata.org/wiki/Q5227230","display_name":"Data access","level":2,"score":0.4154999852180481},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.38499999046325684},{"id":"https://openalex.org/C137822555","wikidata":"https://www.wikidata.org/wiki/Q2587068","display_name":"Information sensitivity","level":2,"score":0.36500000953674316},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.362199991941452},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.3483999967575073},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.31869998574256897},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.31220000982284546},{"id":"https://openalex.org/C119839945","wikidata":"https://www.wikidata.org/wiki/Q6545185","display_name":"Unique identifier","level":3,"score":0.2904999852180481},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.2809999883174896},{"id":"https://openalex.org/C86532276","wikidata":"https://www.wikidata.org/wiki/Q1184065","display_name":"Delegation","level":2,"score":0.2745000123977661},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.25999999046325684},{"id":"https://openalex.org/C2777402240","wikidata":"https://www.wikidata.org/wiki/Q6783436","display_name":"Masking (illustration)","level":2,"score":0.2558000087738037},{"id":"https://openalex.org/C205295232","wikidata":"https://www.wikidata.org/wiki/Q76320","display_name":"Database server","level":2,"score":0.2531000077724457},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.2524999976158142},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2522999942302704}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00533-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00533-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00533-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:b284b47aea814b05af0d2d82c6d51374","is_oa":true,"landing_page_url":"https://doaj.org/article/b284b47aea814b05af0d2d82c6d51374","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 9, Iss 1, Pp 1-19 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00533-8","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00533-8","pdf_url":"https://link.springer.com/content/pdf/10.1186/s42400-025-00533-8.pdf","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6762734055519104}],"awards":[{"id":"https://openalex.org/G7145206591","display_name":null,"funder_award_id":"2021YFF0704102","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G7641350059","display_name":null,"funder_award_id":"CSTB2025NSCQ-GPX1263","funder_id":"https://openalex.org/F4320323172","funder_display_name":"Natural Science Foundation of Chongqing"},{"id":"https://openalex.org/G8934248645","display_name":null,"funder_award_id":"KJZD-K202400610","funder_id":"https://openalex.org/F4320324805","funder_display_name":"Chongqing Municipal Education Commission"}],"funders":[{"id":"https://openalex.org/F4320323172","display_name":"Natural Science Foundation of Chongqing","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320324805","display_name":"Chongqing Municipal Education Commission","ror":"https://ror.org/031nm5713"},{"id":"https://openalex.org/F4320327639","display_name":"Centre Scientifique et Technique du B\u00e2timent","ror":"https://ror.org/02fsd1928"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7118131878.pdf","grobid_xml":"https://content.openalex.org/works/W7118131878.grobid-xml"},"referenced_works_count":39,"referenced_works":["https://openalex.org/W1488650642","https://openalex.org/W1745686190","https://openalex.org/W2073346043","https://openalex.org/W2135043765","https://openalex.org/W2767202484","https://openalex.org/W2845638444","https://openalex.org/W2883089683","https://openalex.org/W2889812870","https://openalex.org/W2896725271","https://openalex.org/W2984541622","https://openalex.org/W2990789045","https://openalex.org/W3080417726","https://openalex.org/W3171091364","https://openalex.org/W3190730108","https://openalex.org/W3213220428","https://openalex.org/W3214610463","https://openalex.org/W4245799029","https://openalex.org/W4280572029","https://openalex.org/W4288057738","https://openalex.org/W4308642907","https://openalex.org/W4321448322","https://openalex.org/W4323519519","https://openalex.org/W4327714528","https://openalex.org/W4366286067","https://openalex.org/W4376639489","https://openalex.org/W4384948632","https://openalex.org/W4392114370","https://openalex.org/W4392397286","https://openalex.org/W4392667139","https://openalex.org/W4401211558","https://openalex.org/W4402262184","https://openalex.org/W4402264280","https://openalex.org/W4402264489","https://openalex.org/W4402835827","https://openalex.org/W4405181715","https://openalex.org/W4405182692","https://openalex.org/W4405182704","https://openalex.org/W4405184286","https://openalex.org/W4408805382"],"related_works":[],"abstract_inverted_index":{"Abstract":[0],"Private":[1],"Information":[2],"Retrieval":[3],"(PIR)":[4],"is":[5,26,37,52,77,169],"a":[6,18,101,144,195],"cryptographic":[7],"technique":[8],"that":[9,34,106,131,164,179,213,239],"allows":[10],"Data":[11,44],"User":[12],"(DU)":[13],"to":[14,64,70,79,129,156,254],"retrieve":[15,80],"data":[16,24,36,51,72,167,172],"from":[17,249],"SERVER":[19,241],"without":[20,232],"revealing":[21],"which":[22,75],"specific":[23],"item":[25],"being":[27],"accessed.":[28],"Traditional":[29],"PIR":[30,104,222],"protocols":[31],"typically":[32],"assume":[33],"the":[35,67,81,92,139,165,199,217,240,246,265],"locally":[38],"stored":[39],"and":[40,115,153,174,204,219,259],"directly":[41],"controlled":[42],"by":[43,226],"Owner":[45],"(DO),":[46],"but":[47],"in":[48,223],"real-world":[49],"scenarios,":[50],"often":[53],"hosted":[54],"on":[55,150],"untrusted":[56],"third-party":[57],"SERVERs,":[58],"making":[59],"it":[60],"difficult":[61],"for":[62,113,118,124],"DO":[63,114],"effectively":[65],"restrict":[66],"SERVER\u2019s":[68],"access":[69,116,127,138,230],"their":[71],"or":[73,86],"control":[74,117,128,231],"DU":[76,88,133,158,181],"authorized":[78,183],"data.":[82],"Consequently,":[83],"malicious":[84],"SERVERs":[85],"unauthorized":[87,191],"may":[89],"infringe":[90],"upon":[91],"privacy":[93,111,168],"rights":[94],"of":[95,198,221],"DO.":[96],"This":[97],"paper":[98],"presents":[99],"SecOutPIR,":[100],"novel":[102],"outsourced":[103,224],"system":[105,148,162,200],"addresses":[107],"two":[108],"key":[109],"challenges:":[110],"preservation":[112],"DU.":[119],"SecOutPIR":[120,214],"integrates":[121],"attribute-based":[122],"encryption":[123],"fine-grained":[125,228],"retrieval":[126,136,184,187,229],"ensure":[130],"only":[132,180],"with":[134,182,245],"valid":[135],"can":[137,185],"data,":[140],"while":[141,176,264],"also":[142,177],"utilizing":[143],"decentralized":[145,151],"identity":[146],"management":[147],"based":[149],"identifiers":[152],"verifiable":[154],"credentials":[155],"authenticate":[157],"requests.":[159],"The":[160],"proposed":[161],"ensures":[163],"DO\u2019s":[166],"protected":[170],"during":[171],"storage":[173],"retrieval,":[175],"ensuring":[178],"make":[186],"requests,":[188],"thus":[189],"preventing":[190],"access.":[192],"We":[193],"provide":[194],"detailed":[196],"description":[197],"model,":[201],"security":[202,207],"requirements,":[203],"an":[205],"in-depth":[206],"analysis.":[208],"Furthermore,":[209],"experimental":[210],"results":[211],"demonstrate":[212],"significantly":[215],"enhances":[216],"practicality":[218],"efficiency":[220],"settings":[225],"enabling":[227],"degrading":[233],"query":[234,266],"performance.":[235],"Our":[236],"implementation":[237],"demonstrates":[238],"reply":[242],"time":[243,268],"increases":[244],"dataset":[247],"size,":[248],"82.5":[250],"ms":[251,256,261],"(1000":[252],"entries)":[253,258],"113.8":[255],"(2000":[257],"199.6":[260],"(5000":[262],"entries),":[263],"generation":[267],"remains":[269],"approximately":[270],"constant":[271],"at":[272],"around":[273],"2.0":[274],"ms.":[275]},"counts_by_year":[],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2026-01-04T00:00:00"}
