{"id":"https://openalex.org/W4400413610","doi":"https://doi.org/10.62056/a09qxrxqi","title":"Efficient Post-Quantum Pattern Matching on Encrypted Data","display_name":"Efficient Post-Quantum Pattern Matching on Encrypted Data","publication_year":2024,"publication_date":"2024-07-08","ids":{"openalex":"https://openalex.org/W4400413610","doi":"https://doi.org/10.62056/a09qxrxqi"},"language":"en","primary_location":{"id":"doi:10.62056/a09qxrxqi","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a09qxrxqi","pdf_url":"https://cic.iacr.org/p/1/2/22/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://cic.iacr.org/p/1/2/22/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007284478","display_name":"Anis Bkakria","orcid":"https://orcid.org/0000-0002-9758-4617"},"institutions":[{"id":"https://openalex.org/I3018083178","display_name":"Institut de Recherche Technologique SystemX","ror":"https://ror.org/03crmsn52","country_code":"FR","type":"facility","lineage":["https://openalex.org/I3018083178"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Anis Bkakria","raw_affiliation_strings":["IRT SystemX"],"affiliations":[{"raw_affiliation_string":"IRT SystemX","institution_ids":["https://openalex.org/I3018083178"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074733198","display_name":"Malika Izabach\u00e8ne","orcid":"https://orcid.org/0000-0003-0216-7958"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Malika Izabach\u00e8ne","raw_affiliation_strings":["Unaffiliated"],"affiliations":[{"raw_affiliation_string":"Unaffiliated","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5007284478"],"corresponding_institution_ids":["https://openalex.org/I3018083178"],"apc_list":null,"apc_paid":null,"fwci":0.3592,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.64540997,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9907000064849854,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7803270816802979},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7170120477676392},{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.6594889163970947},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5701497197151184},{"id":"https://openalex.org/keywords/matching","display_name":"Matching (statistics)","score":0.4941108524799347},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4597369432449341},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.38543543219566345},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2291054129600525},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.12491384148597717},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.09440508484840393}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7803270816802979},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7170120477676392},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.6594889163970947},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5701497197151184},{"id":"https://openalex.org/C165064840","wikidata":"https://www.wikidata.org/wiki/Q1321061","display_name":"Matching (statistics)","level":2,"score":0.4941108524799347},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4597369432449341},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.38543543219566345},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2291054129600525},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.12491384148597717},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.09440508484840393}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.62056/a09qxrxqi","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a09qxrxqi","pdf_url":"https://cic.iacr.org/p/1/2/22/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},{"id":"pmh:oai:HAL:hal-04865163v1","is_oa":true,"landing_page_url":"https://hal.science/hal-04865163","pdf_url":"https://hal.science/hal-04865163/document","source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IACR Communications in Cryptology, 2024, 1 (2), &#x27E8;10.62056/a09qxrxqi&#x27E9;","raw_type":"Journal articles"}],"best_oa_location":{"id":"doi:10.62056/a09qxrxqi","is_oa":true,"landing_page_url":"https://doi.org/10.62056/a09qxrxqi","pdf_url":"https://cic.iacr.org/p/1/2/22/pdf","source":{"id":"https://openalex.org/S4394708374","display_name":"IACR Communications in Cryptology","issn_l":"3006-5496","issn":["3006-5496"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320989","host_organization_name":"International Association for Cryptologic Research","host_organization_lineage":["https://openalex.org/P4310320989"],"host_organization_lineage_names":["International Association for Cryptologic Research"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IACR Communications in Cryptology","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7300000190734863,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4400413610.pdf","grobid_xml":"https://content.openalex.org/works/W4400413610.grobid-xml"},"referenced_works_count":20,"referenced_works":["https://openalex.org/W104209573","https://openalex.org/W202591642","https://openalex.org/W1499011609","https://openalex.org/W1724472458","https://openalex.org/W1945892390","https://openalex.org/W2031533839","https://openalex.org/W2062805799","https://openalex.org/W2069900560","https://openalex.org/W2108343866","https://openalex.org/W2147929033","https://openalex.org/W2226167778","https://openalex.org/W2235087147","https://openalex.org/W2400700555","https://openalex.org/W2603792932","https://openalex.org/W2883042185","https://openalex.org/W2898195193","https://openalex.org/W3023005106","https://openalex.org/W3028867652","https://openalex.org/W4200037247","https://openalex.org/W4367663752"],"related_works":["https://openalex.org/W2539930818","https://openalex.org/W4403623784","https://openalex.org/W4393118461","https://openalex.org/W4390664647","https://openalex.org/W3012147850","https://openalex.org/W4313300189","https://openalex.org/W2949835517","https://openalex.org/W2601739120","https://openalex.org/W2625655658","https://openalex.org/W2155069045"],"abstract_inverted_index":{"Pattern":[0],"matching":[1,53,72,160,186,223,255],"methods":[2],"are":[3,18],"essential":[4],"in":[5,137,147,177],"various":[6],"applications":[7,17],"where":[8,91],"users":[9],"must":[10],"disclose":[11],"highly":[12],"sensitive":[13],"information.":[14],"Among":[15],"these":[16],"genomic":[19],"data":[20,46,75,82,94,117],"analysis,":[21,105],"financial":[22],"records":[23],"inspection,":[24],"and":[25,143,184,214,227,246],"intrusion":[26],"detection":[27,104,161],"processes,":[28],"all":[29],"of":[30,40,44,80,130,140,198,230],"which":[31],"necessitate":[32],"robust":[33],"privacy":[34],"protection":[35],"mechanisms.":[36],"Balancing":[37],"the":[38,42,48,78,81,107,111,116,138,166,178,194],"imperative":[39],"protecting":[41],"confidentiality":[43,79],"analyzed":[45],"with":[47],"need":[49],"for":[50,102,181,222,254],"efficient":[51,64,158,168],"pattern":[52,71,103,159,185],"presents":[54],"a":[55,92,123,131,148,156,174,224],"significant":[56,175],"challenge.":[57],"In":[58,86,163],"this":[59],"paper,":[60],"we":[61,88],"propose":[62],"an":[63,99],"post-quantum":[65],"secure":[66],"construction":[67,127,172],"that":[68],"enables":[69],"arbitrary":[70],"over":[73],"encrypted":[74,100,112,188],"while":[76],"ensuring":[77],"to":[83,97,109,120,154,165],"be":[84],"analyzed.":[85],"addition,":[87],"address":[89],"scenarios":[90],"malicious":[93,124],"sender,":[95],"intended":[96],"send":[98],"content":[101],"has":[106],"ability":[108],"modify":[110],"content.":[113],"We":[114],"adapt":[115],"fragmentation":[118],"technique":[119],"handle":[121],"such":[122],"sender.":[125],"Our":[126],"makes":[128],"use":[129],"well-suited":[132],"Homomorphic":[133],"Encryption":[134],"packing":[135],"method":[136],"context":[139],"fragmented":[141],"streams":[142],"combines":[144],"homomorphic":[145],"operations":[146],"leveled":[149],"mode":[150],"(i.e.":[151],"without":[152],"bootstrapping)":[153],"obtain":[155],"very":[157],"process.":[162],"contrast":[164],"most":[167],"state-of-the-art":[169],"scheme,":[170],"our":[171,191],"achieves":[173],"reduction":[176],"time":[179,195],"required":[180],"encryption,":[182],"decryption,":[183],"on":[187],"data.":[189],"Specifically,":[190],"approach":[192],"decreases":[193],"by":[196,228],"factors":[197,229],"<mml:math":[199,205,215,231,237,247,256],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\">":[200,206,216,232,238,248,257],"<mml:mrow>":[201,207,217,233,239,249,258,261],"<mml:mn>1850</mml:mn>":[202],"</mml:mrow>":[203,212,219,235,244,251,263,265],"</mml:math>,":[204,213,220,236,245,252],"<mml:msup>":[208,240,259],"<mml:mn>10</mml:mn>":[209,241,262],"<mml:mn>6</mml:mn>":[210],"</mml:msup>":[211,243,264],"<mml:mn>245</mml:mn>":[218],"respectively,":[221,253],"single":[225],"pattern,":[226],"<mml:mn>115</mml:mn>":[234],"<mml:mn>5</mml:mn>":[242],"<mml:mn>12</mml:mn>":[250],"<mml:mn>2</mml:mn>":[260],"</mml:math>":[266],"patterns.":[267]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-13T14:20:09.374765","created_date":"2025-10-10T00:00:00"}
