{"id":"https://openalex.org/W2769106132","doi":"https://doi.org/10.1504/ijwmc.2017.10009077","title":"Using GSW FHE to provide stronger privacy protection for searchable encryption","display_name":"Using GSW FHE to provide stronger privacy protection for searchable encryption","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2769106132","doi":"https://doi.org/10.1504/ijwmc.2017.10009077","mag":"2769106132"},"language":"en","primary_location":{"id":"doi:10.1504/ijwmc.2017.10009077","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwmc.2017.10009077","pdf_url":null,"source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001911790","display_name":"Baojia Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Baojia Zhang","raw_affiliation_strings":["Department of Computer Science, Nanjing University, NanJing, 210046, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Nanjing University, NanJing, 210046, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036153424","display_name":"Huaiyu Zheng","orcid":null},"institutions":[{"id":"https://openalex.org/I118783713","display_name":"Fujian University of Traditional Chinese Medicine","ror":"https://ror.org/05n0qbd70","country_code":"CN","type":"education","lineage":["https://openalex.org/I118783713"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaiyu Zheng","raw_affiliation_strings":["Department of Center of Modern Educational Technology, Fujian University of Traditional Chinese Medicine, Fujian, 350122, China"],"affiliations":[{"raw_affiliation_string":"Department of Center of Modern Educational Technology, Fujian University of Traditional Chinese Medicine, Fujian, 350122, China","institution_ids":["https://openalex.org/I118783713"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001911790"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.15647781,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"13","issue":"2","first_page":"164","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.984000027179718,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8789693713188171},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.813811182975769},{"id":"https://openalex.org/keywords/outsourcing","display_name":"Outsourcing","score":0.5979318618774414},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.5889322757720947},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5783074498176575},{"id":"https://openalex.org/keywords/volume","display_name":"Volume (thermodynamics)","score":0.5420171022415161},{"id":"https://openalex.org/keywords/download","display_name":"Download","score":0.53709876537323},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5369349122047424},{"id":"https://openalex.org/keywords/inverted-index","display_name":"Inverted index","score":0.4788484573364258},{"id":"https://openalex.org/keywords/index","display_name":"Index (typography)","score":0.46775269508361816},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.45625290274620056},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.33396804332733154},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3191404342651367},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.29352670907974243},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18956267833709717},{"id":"https://openalex.org/keywords/search-engine-indexing","display_name":"Search engine indexing","score":0.07768672704696655}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8789693713188171},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.813811182975769},{"id":"https://openalex.org/C46934059","wikidata":"https://www.wikidata.org/wiki/Q61515","display_name":"Outsourcing","level":2,"score":0.5979318618774414},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.5889322757720947},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5783074498176575},{"id":"https://openalex.org/C20556612","wikidata":"https://www.wikidata.org/wiki/Q4469374","display_name":"Volume (thermodynamics)","level":2,"score":0.5420171022415161},{"id":"https://openalex.org/C2780154274","wikidata":"https://www.wikidata.org/wiki/Q7126717","display_name":"Download","level":2,"score":0.53709876537323},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5369349122047424},{"id":"https://openalex.org/C130590232","wikidata":"https://www.wikidata.org/wiki/Q1671754","display_name":"Inverted index","level":3,"score":0.4788484573364258},{"id":"https://openalex.org/C2777382242","wikidata":"https://www.wikidata.org/wiki/Q6017816","display_name":"Index (typography)","level":2,"score":0.46775269508361816},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.45625290274620056},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33396804332733154},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3191404342651367},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.29352670907974243},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18956267833709717},{"id":"https://openalex.org/C75165309","wikidata":"https://www.wikidata.org/wiki/Q2258979","display_name":"Search engine indexing","level":2,"score":0.07768672704696655},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijwmc.2017.10009077","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijwmc.2017.10009077","pdf_url":null,"source":{"id":"https://openalex.org/S168395412","display_name":"International Journal of Wireless and Mobile Computing","issn_l":"1741-1084","issn":["1741-1084","1741-1092"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Wireless and Mobile Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2358200898","https://openalex.org/W4231184955","https://openalex.org/W2325765407","https://openalex.org/W2788012436","https://openalex.org/W618293728","https://openalex.org/W2291845669","https://openalex.org/W200604156","https://openalex.org/W2374784346","https://openalex.org/W4286615217","https://openalex.org/W2104856285"],"abstract_inverted_index":{"Nowadays,":[0],"with":[1],"increasingly":[2],"strong":[3],"awareness":[4],"of":[5,50,63,160,167,189,199],"privacy":[6,110,143,159],"protection,":[7],"more":[8,10],"and":[9,17,79,96,121,153,165,192],"people":[11,39],"choose":[12],"to":[13,21,26,74,87,114,136],"encrypt":[14],"their":[15],"data":[16,30,64,78,116,171],"then":[18],"outsource":[19],"it":[20,69],"the":[22,28,47,61,76,101,109,115,119,125,151,154,158,161,170,178,187,193,196],"server,":[23],"but":[24,52,104],"how":[25],"search":[27,80,149],"encrypted":[29,102],"is":[31,56,65,70,86],"a":[32,57,93,133],"challenging":[33],"problem":[34],"in":[35],"this":[36,42,105,129,138],"situation.":[37],"Many":[38],"have":[40],"studied":[41],"problem,":[43],"not":[44,124],"only":[45],"for":[46,72,145],"fundamental":[48],"property":[49],"this,":[51],"also":[53],"because":[54],"there":[55],"practical":[58],"issue":[59],"where":[60],"volume":[62],"so":[66],"huge":[67],"that":[68],"impractical":[71],"users":[73,146],"download":[75],"whole":[77],"on":[81,100,150],"it.":[82],"One":[83],"common":[84],"solution":[85],"build":[88],"an":[89],"inverted":[90,162],"index":[91,163],"using":[92],"special":[94],"algorithm":[95,99],"support":[97],"searchable":[98],"data,":[103,152],"causes":[106],"another":[107],"problem:":[108],"will":[111],"be":[112],"leaked":[113],"owner":[117,120,172],"when":[118,147],"user":[122],"are":[123],"same":[126],"person.":[127],"In":[128],"paper,":[130],"we":[131,185],"design":[132],"novel":[134],"scheme":[135,155],"solve":[137],"problem.":[139],"We":[140],"provide":[141],"stronger":[142],"protection":[144],"they":[148],"can":[156],"protect":[157],"table":[164],"content":[166],"data.":[168],"Besides,":[169],"cannot":[173],"get":[174],"any":[175],"information":[176],"about":[177],"query":[179],"messages":[180],"searched":[181],"by":[182],"users.":[183],"Also,":[184],"analyse":[186],"security":[188],"our":[190,200],"scheme,":[191],"simulation":[194],"demonstrates":[195],"good":[197],"performance":[198],"scheme.":[201]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
