{"id":"https://openalex.org/W3108454941","doi":"https://doi.org/10.3233/faia200807","title":"Order-Preserving and Efficient One-to-Many Search on Encrypted Data","display_name":"Order-Preserving and Efficient One-to-Many Search on Encrypted Data","publication_year":2020,"publication_date":"2020-12-02","ids":{"openalex":"https://openalex.org/W3108454941","doi":"https://doi.org/10.3233/faia200807","mag":"3108454941"},"language":"en","primary_location":{"id":"doi:10.3233/faia200807","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200807","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200807","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200807","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046012208","display_name":"Dongping Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dongping Hu","raw_affiliation_strings":["School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073156180","display_name":"Aihua Yin","orcid":"https://orcid.org/0000-0002-0324-5260"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Aihua Yin","raw_affiliation_strings":["School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073321302","display_name":"Huaying Yan","orcid":null},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Huaying Yan","raw_affiliation_strings":["School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China","institution_ids":["https://openalex.org/I59649739"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5083325807","display_name":"Tao Long","orcid":"https://orcid.org/0000-0003-4029-2960"},"institutions":[{"id":"https://openalex.org/I59649739","display_name":"Jiangxi University of Finance and Economics","ror":"https://ror.org/03efmyj29","country_code":"CN","type":"education","lineage":["https://openalex.org/I59649739"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tao Long","raw_affiliation_strings":["School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China"],"affiliations":[{"raw_affiliation_string":"School of Software and Internet of Things Engineering, Jiangxi University of Finance and Economics, Nanchang 330023, Jiangxi, China","institution_ids":["https://openalex.org/I59649739"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073156180"],"corresponding_institution_ids":["https://openalex.org/I59649739"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22795914,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9631999731063843,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7550573348999023},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.6722793579101562},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6664047837257385},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5846530795097351},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.49842000007629395},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4369690418243408},{"id":"https://openalex.org/keywords/range-query","display_name":"Range query (database)","score":0.4167509973049164},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.3496567904949188},{"id":"https://openalex.org/keywords/search-engine","display_name":"Search engine","score":0.1118190586566925},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.06371757388114929}],"concepts":[{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7550573348999023},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.6722793579101562},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6664047837257385},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5846530795097351},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.49842000007629395},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4369690418243408},{"id":"https://openalex.org/C136736807","wikidata":"https://www.wikidata.org/wiki/Q818943","display_name":"Range query (database)","level":5,"score":0.4167509973049164},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.3496567904949188},{"id":"https://openalex.org/C97854310","wikidata":"https://www.wikidata.org/wiki/Q19541","display_name":"Search engine","level":2,"score":0.1118190586566925},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.06371757388114929},{"id":"https://openalex.org/C192939062","wikidata":"https://www.wikidata.org/wiki/Q104840822","display_name":"Sargable","level":4,"score":0.0},{"id":"https://openalex.org/C164120249","wikidata":"https://www.wikidata.org/wiki/Q995982","display_name":"Web search query","level":3,"score":0.0},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/faia200807","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200807","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200807","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"}],"best_oa_location":{"id":"doi:10.3233/faia200807","is_oa":true,"landing_page_url":"https://doi.org/10.3233/faia200807","pdf_url":"https://ebooks.iospress.nl/pdf/doi/10.3233/FAIA200807","source":{"id":"https://openalex.org/S4210201731","display_name":"Frontiers in artificial intelligence and applications","issn_l":"0922-6389","issn":["0922-6389","1879-8314"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Artificial Intelligence and Applications","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3108454941.pdf","grobid_xml":"https://content.openalex.org/works/W3108454941.grobid-xml"},"referenced_works_count":16,"referenced_works":["https://openalex.org/W1535111405","https://openalex.org/W1575299154","https://openalex.org/W1895952394","https://openalex.org/W2000214662","https://openalex.org/W2030888439","https://openalex.org/W2031533839","https://openalex.org/W2053580320","https://openalex.org/W2108590723","https://openalex.org/W2109915041","https://openalex.org/W2154496743","https://openalex.org/W2912568927","https://openalex.org/W3030004290","https://openalex.org/W3195469701","https://openalex.org/W4244639401","https://openalex.org/W6639572707","https://openalex.org/W6683041853"],"related_works":["https://openalex.org/W2997530193","https://openalex.org/W2942137924","https://openalex.org/W4236344152","https://openalex.org/W4310649982","https://openalex.org/W2011667854","https://openalex.org/W1589129854","https://openalex.org/W2802117553","https://openalex.org/W2939324531","https://openalex.org/W4312331883","https://openalex.org/W2135000443"],"abstract_inverted_index":{"Order-preserving":[0],"encryption":[1,58,92],"(OPE)":[2],"is":[3,43,53,59,122,137,148,153,177],"an":[4,75],"useful":[5],"tool":[6],"in":[7,32,46,134],"cloud":[8,48],"computing":[9],"as":[10,140],"it":[11,62],"allows":[12],"untrustworthy":[13],"server":[14],"to":[15,124],"execute":[16],"range":[17],"query":[18],"or":[19],"exact":[20,115,168],"keyword":[21],"search":[22,103],"directly":[23],"on":[24,104],"the":[25,33,37,47,50,56,64,82,85,91,96,111,126,129,135,141,144,172],"ciphertexts.":[26],"It":[27,147],"only":[28],"requires":[29],"sub-linear":[30],"time":[31],"data":[34,51],"size":[35,127],"while":[36],"queries":[38],"are":[39],"occurred.":[40],"This":[41],"advantage":[42],"very":[44],"suitable":[45],"where":[49],"volume":[52],"huge.":[54],"However,":[55],"order-preserving":[57],"deterministic":[60,157],"and":[61,67,84,107,167],"leaks":[63],"plaintexts\u2019":[65],"order":[66],"its":[68],"distribution.":[69],"In":[70,163],"this":[71],"paper,":[72],"we":[73],"propose":[74],"one-to-many":[76],"OPE":[77,158],"by":[78,100],"taking":[79],"into":[80],"account":[81],"security":[83],"efficiency.":[86],"For":[87],"a":[88,132,165],"given":[89,145],"plaintext,":[90],"algorithm":[93,117,170],"firstly":[94],"determines":[95],"corresponding":[97],"ciphertext":[98,105],"gap":[99,136],"performing":[101],"binary":[102],"space":[106,109],"plaintext":[108],"at":[110],"same":[112],"time.":[113],"An":[114],"sample":[116],"for":[118,171],"negative":[119,173],"hypergeometric":[120,174],"distribution":[121,175],"used":[123],"fix":[125],"of":[128,143],"gap.":[130],"Lastly":[131],"value":[133],"randomly":[138],"chosen":[139],"mapping":[142],"plaintext.":[146],"proven":[149],"that":[150],"our":[151],"scheme":[152],"more":[154],"secure":[155],"than":[156],"with":[159],"realizing":[160],"efficient":[161],"search.":[162],"particular,":[164],"practical":[166],"sampling":[169],"(NHGD)":[176],"first":[178],"proposed.":[179]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
