Efficient Private Information Retrieval Scheme with Dynamic Database Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.3390/electronics14173441
Private information retrieval (PIR) is a typical application scenario of encrypted computing, which allows users to retrieve data from a database by providing only an encrypted index. In an academic research scenario, multiple parties may entrust their data to a third party and require collaborative retrieval. However, due to competitive relationships and mutual distrust between these parties, they do not share public–private keys, making single-key mechanisms inadequate for meeting actual privacy requirements. In this case, based on the multi-key fully homomorphic encryption (MKFHE) algorithm, we construct an efficient PIR scheme with an access permission verification mechanism and dynamic database. Specifically, we design an MKFHE algorithm to protect multi-user privacy information. The vector–matrix multiplication optimization algorithm is adopted to improve computational efficiency, the expand algorithm is used to reduce user communication traffic, and homomorphic multiplication with ciphertext chunking is used to avoid excessive noise caused by direct ciphertext multiplication. Experiments based on the SEAL library show that by transferring part of the computational pressure to the offline stage, the online query response efficiency of our scheme is improved by about 7.69%, and the online computational efficiency of vector–matrix multiplication is improved by about 19.7%.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.3390/electronics14173441
- https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377
- OA Status
- gold
- Cited By
- 1
- References
- 19
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4413832561
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4413832561Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.3390/electronics14173441Digital Object Identifier
- Title
-
Efficient Private Information Retrieval Scheme with Dynamic DatabaseWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-08-29Full publication date if available
- Authors
-
Xin Li, Wenju Xu, Dianhua Tang, Yunfei Cao, Jing Zhang, Wei ZhaoList of authors in order
- Landing page
-
https://doi.org/10.3390/electronics14173441Publisher landing page
- PDF URL
-
https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
goldOpen access status per OpenAlex
- OA URL
-
https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377Direct OA link when available
- Concepts
-
Scheme (mathematics), Computer science, Database, Information retrieval, Data mining, Mathematics, Mathematical analysisTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
1Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 1Per-year citation counts (last 5 years)
- References (count)
-
19Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4413832561 |
|---|---|
| doi | https://doi.org/10.3390/electronics14173441 |
| ids.doi | https://doi.org/10.3390/electronics14173441 |
| ids.openalex | https://openalex.org/W4413832561 |
| fwci | 4.81974515 |
| type | article |
| title | Efficient Private Information Retrieval Scheme with Dynamic Database |
| awards[0].id | https://openalex.org/G3504531889 |
| awards[0].funder_id | https://openalex.org/F4320335777 |
| awards[0].display_name | |
| awards[0].funder_award_id | 2023YFB3106200 |
| awards[0].funder_display_name | National Key Research and Development Program of China |
| biblio.issue | 17 |
| biblio.volume | 14 |
| biblio.last_page | 3441 |
| biblio.first_page | 3441 |
| topics[0].id | https://openalex.org/T10237 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1702 |
| topics[0].subfield.display_name | Artificial Intelligence |
| topics[0].display_name | Cryptography and Data Security |
| topics[1].id | https://openalex.org/T10764 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9993000030517578 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1702 |
| topics[1].subfield.display_name | Artificial Intelligence |
| topics[1].display_name | Privacy-Preserving Technologies in Data |
| topics[2].id | https://openalex.org/T11614 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9943000078201294 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1710 |
| topics[2].subfield.display_name | Information Systems |
| topics[2].display_name | Cloud Data Security Solutions |
| funders[0].id | https://openalex.org/F4320335777 |
| funders[0].ror | |
| funders[0].display_name | National Key Research and Development Program of China |
| is_xpac | False |
| apc_list.value | 2000 |
| apc_list.currency | CHF |
| apc_list.value_usd | 2165 |
| apc_paid.value | 2000 |
| apc_paid.currency | CHF |
| apc_paid.value_usd | 2165 |
| concepts[0].id | https://openalex.org/C77618280 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7359534502029419 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q1155772 |
| concepts[0].display_name | Scheme (mathematics) |
| concepts[1].id | https://openalex.org/C41008148 |
| concepts[1].level | 0 |
| concepts[1].score | 0.6478308439254761 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[1].display_name | Computer science |
| concepts[2].id | https://openalex.org/C77088390 |
| concepts[2].level | 1 |
| concepts[2].score | 0.5783216953277588 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q8513 |
| concepts[2].display_name | Database |
| concepts[3].id | https://openalex.org/C23123220 |
| concepts[3].level | 1 |
| concepts[3].score | 0.506913959980011 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q816826 |
| concepts[3].display_name | Information retrieval |
| concepts[4].id | https://openalex.org/C124101348 |
| concepts[4].level | 1 |
| concepts[4].score | 0.3639301061630249 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q172491 |
| concepts[4].display_name | Data mining |
| concepts[5].id | https://openalex.org/C33923547 |
| concepts[5].level | 0 |
| concepts[5].score | 0.14805066585540771 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[5].display_name | Mathematics |
| concepts[6].id | https://openalex.org/C134306372 |
| concepts[6].level | 1 |
| concepts[6].score | 0.0 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7754 |
| concepts[6].display_name | Mathematical analysis |
| keywords[0].id | https://openalex.org/keywords/scheme |
| keywords[0].score | 0.7359534502029419 |
| keywords[0].display_name | Scheme (mathematics) |
| keywords[1].id | https://openalex.org/keywords/computer-science |
| keywords[1].score | 0.6478308439254761 |
| keywords[1].display_name | Computer science |
| keywords[2].id | https://openalex.org/keywords/database |
| keywords[2].score | 0.5783216953277588 |
| keywords[2].display_name | Database |
| keywords[3].id | https://openalex.org/keywords/information-retrieval |
| keywords[3].score | 0.506913959980011 |
| keywords[3].display_name | Information retrieval |
| keywords[4].id | https://openalex.org/keywords/data-mining |
| keywords[4].score | 0.3639301061630249 |
| keywords[4].display_name | Data mining |
| keywords[5].id | https://openalex.org/keywords/mathematics |
| keywords[5].score | 0.14805066585540771 |
| keywords[5].display_name | Mathematics |
| language | en |
| locations[0].id | doi:10.3390/electronics14173441 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210202905 |
| locations[0].source.issn | 2079-9292 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 2079-9292 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Electronics |
| locations[0].source.host_organization | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310310987 |
| locations[0].source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377 |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Electronics |
| locations[0].landing_page_url | https://doi.org/10.3390/electronics14173441 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5100353809 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1618-4786 |
| authorships[0].author.display_name | Xin Li |
| authorships[0].countries | CN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I2800372957 |
| authorships[0].affiliations[0].raw_affiliation_string | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[0].institutions[0].id | https://openalex.org/I2800372957 |
| authorships[0].institutions[0].ror | https://ror.org/0098hst83 |
| authorships[0].institutions[0].type | company |
| authorships[0].institutions[0].lineage | https://openalex.org/I2800372957 |
| authorships[0].institutions[0].country_code | CN |
| authorships[0].institutions[0].display_name | China Electronics Technology Group Corporation |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Xin Li |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[1].author.id | https://openalex.org/A5080573768 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-7703-882X |
| authorships[1].author.display_name | Wenju Xu |
| authorships[1].countries | CN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I2800372957 |
| authorships[1].affiliations[0].raw_affiliation_string | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[1].institutions[0].id | https://openalex.org/I2800372957 |
| authorships[1].institutions[0].ror | https://ror.org/0098hst83 |
| authorships[1].institutions[0].type | company |
| authorships[1].institutions[0].lineage | https://openalex.org/I2800372957 |
| authorships[1].institutions[0].country_code | CN |
| authorships[1].institutions[0].display_name | China Electronics Technology Group Corporation |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Wenju Xu |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[2].author.id | https://openalex.org/A5060155268 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-3169-4928 |
| authorships[2].author.display_name | Dianhua Tang |
| authorships[2].countries | CN |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I2800372957 |
| authorships[2].affiliations[0].raw_affiliation_string | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[2].institutions[0].id | https://openalex.org/I2800372957 |
| authorships[2].institutions[0].ror | https://ror.org/0098hst83 |
| authorships[2].institutions[0].type | company |
| authorships[2].institutions[0].lineage | https://openalex.org/I2800372957 |
| authorships[2].institutions[0].country_code | CN |
| authorships[2].institutions[0].display_name | China Electronics Technology Group Corporation |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Dianhua Tang |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[3].author.id | https://openalex.org/A5054411564 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Yunfei Cao |
| authorships[3].countries | CN |
| authorships[3].affiliations[0].institution_ids | https://openalex.org/I2800372957 |
| authorships[3].affiliations[0].raw_affiliation_string | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[3].institutions[0].id | https://openalex.org/I2800372957 |
| authorships[3].institutions[0].ror | https://ror.org/0098hst83 |
| authorships[3].institutions[0].type | company |
| authorships[3].institutions[0].lineage | https://openalex.org/I2800372957 |
| authorships[3].institutions[0].country_code | CN |
| authorships[3].institutions[0].display_name | China Electronics Technology Group Corporation |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Yunfei Cao |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[4].author.id | https://openalex.org/A5115603669 |
| authorships[4].author.orcid | https://orcid.org/0000-0002-7650-4702 |
| authorships[4].author.display_name | Jing Zhang |
| authorships[4].countries | CN |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I2800372957 |
| authorships[4].affiliations[0].raw_affiliation_string | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[4].institutions[0].id | https://openalex.org/I2800372957 |
| authorships[4].institutions[0].ror | https://ror.org/0098hst83 |
| authorships[4].institutions[0].type | company |
| authorships[4].institutions[0].lineage | https://openalex.org/I2800372957 |
| authorships[4].institutions[0].country_code | CN |
| authorships[4].institutions[0].display_name | China Electronics Technology Group Corporation |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Jing Zhang |
| authorships[4].is_corresponding | False |
| authorships[4].raw_affiliation_strings | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[5].author.id | https://openalex.org/A5002311337 |
| authorships[5].author.orcid | https://orcid.org/0000-0002-6268-2559 |
| authorships[5].author.display_name | Wei Zhao |
| authorships[5].countries | CN |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I2800372957 |
| authorships[5].affiliations[0].raw_affiliation_string | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| authorships[5].institutions[0].id | https://openalex.org/I2800372957 |
| authorships[5].institutions[0].ror | https://ror.org/0098hst83 |
| authorships[5].institutions[0].type | company |
| authorships[5].institutions[0].lineage | https://openalex.org/I2800372957 |
| authorships[5].institutions[0].country_code | CN |
| authorships[5].institutions[0].display_name | China Electronics Technology Group Corporation |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Wei Zhao |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | National Key Laboratory of Security Communication, The 30th Research Institute of China Electronics Technology Group Corporation, Chengdu 610041, China |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377 |
| open_access.oa_status | gold |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Efficient Private Information Retrieval Scheme with Dynamic Database |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10237 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1702 |
| primary_topic.subfield.display_name | Artificial Intelligence |
| primary_topic.display_name | Cryptography and Data Security |
| related_works | https://openalex.org/W4391375266, https://openalex.org/W2899084033, https://openalex.org/W2748952813, https://openalex.org/W2390279801, https://openalex.org/W4391913857, https://openalex.org/W2358668433, https://openalex.org/W4396701345, https://openalex.org/W2376932109, https://openalex.org/W2001405890, https://openalex.org/W4396696052 |
| cited_by_count | 1 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.3390/electronics14173441 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210202905 |
| best_oa_location.source.issn | 2079-9292 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 2079-9292 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Electronics |
| best_oa_location.source.host_organization | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| best_oa_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377 |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Electronics |
| best_oa_location.landing_page_url | https://doi.org/10.3390/electronics14173441 |
| primary_location.id | doi:10.3390/electronics14173441 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210202905 |
| primary_location.source.issn | 2079-9292 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 2079-9292 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Electronics |
| primary_location.source.host_organization | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_name | Multidisciplinary Digital Publishing Institute |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310310987 |
| primary_location.source.host_organization_lineage_names | Multidisciplinary Digital Publishing Institute |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://www.mdpi.com/2079-9292/14/17/3441/pdf?version=1756431377 |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Electronics |
| primary_location.landing_page_url | https://doi.org/10.3390/electronics14173441 |
| publication_date | 2025-08-29 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W2031533839, https://openalex.org/W2048994663, https://openalex.org/W2401976587, https://openalex.org/W2883089683, https://openalex.org/W3213220428, https://openalex.org/W56544557, https://openalex.org/W4288057738, https://openalex.org/W2007466965, https://openalex.org/W74973629, https://openalex.org/W2889746123, https://openalex.org/W4405170920, https://openalex.org/W1755636270, https://openalex.org/W2943497929, https://openalex.org/W2985527074, https://openalex.org/W2499340481, https://openalex.org/W2098290658, https://openalex.org/W2766141585, https://openalex.org/W2991092021, https://openalex.org/W198033559 |
| referenced_works_count | 19 |
| abstract_inverted_index.a | 5, 19, 39 |
| abstract_inverted_index.In | 27, 72 |
| abstract_inverted_index.an | 24, 28, 86, 91, 102 |
| abstract_inverted_index.by | 21, 144, 156, 177, 190 |
| abstract_inverted_index.do | 58 |
| abstract_inverted_index.is | 4, 115, 124, 137, 175, 188 |
| abstract_inverted_index.of | 9, 159, 172, 185 |
| abstract_inverted_index.on | 76, 150 |
| abstract_inverted_index.to | 15, 38, 48, 105, 117, 126, 139, 163 |
| abstract_inverted_index.we | 84, 100 |
| abstract_inverted_index.PIR | 88 |
| abstract_inverted_index.The | 110 |
| abstract_inverted_index.and | 42, 51, 96, 131, 180 |
| abstract_inverted_index.due | 47 |
| abstract_inverted_index.for | 67 |
| abstract_inverted_index.may | 34 |
| abstract_inverted_index.not | 59 |
| abstract_inverted_index.our | 173 |
| abstract_inverted_index.the | 77, 121, 151, 160, 164, 167, 181 |
| abstract_inverted_index.SEAL | 152 |
| abstract_inverted_index.data | 17, 37 |
| abstract_inverted_index.from | 18 |
| abstract_inverted_index.only | 23 |
| abstract_inverted_index.part | 158 |
| abstract_inverted_index.show | 154 |
| abstract_inverted_index.that | 155 |
| abstract_inverted_index.they | 57 |
| abstract_inverted_index.this | 73 |
| abstract_inverted_index.used | 125, 138 |
| abstract_inverted_index.user | 128 |
| abstract_inverted_index.with | 90, 134 |
| abstract_inverted_index.(PIR) | 3 |
| abstract_inverted_index.MKFHE | 103 |
| abstract_inverted_index.about | 178, 191 |
| abstract_inverted_index.avoid | 140 |
| abstract_inverted_index.based | 75, 149 |
| abstract_inverted_index.case, | 74 |
| abstract_inverted_index.fully | 79 |
| abstract_inverted_index.keys, | 62 |
| abstract_inverted_index.noise | 142 |
| abstract_inverted_index.party | 41 |
| abstract_inverted_index.query | 169 |
| abstract_inverted_index.share | 60 |
| abstract_inverted_index.their | 36 |
| abstract_inverted_index.these | 55 |
| abstract_inverted_index.third | 40 |
| abstract_inverted_index.users | 14 |
| abstract_inverted_index.which | 12 |
| abstract_inverted_index.19.7%. | 192 |
| abstract_inverted_index.7.69%, | 179 |
| abstract_inverted_index.access | 92 |
| abstract_inverted_index.actual | 69 |
| abstract_inverted_index.allows | 13 |
| abstract_inverted_index.caused | 143 |
| abstract_inverted_index.design | 101 |
| abstract_inverted_index.direct | 145 |
| abstract_inverted_index.expand | 122 |
| abstract_inverted_index.index. | 26 |
| abstract_inverted_index.making | 63 |
| abstract_inverted_index.mutual | 52 |
| abstract_inverted_index.online | 168, 182 |
| abstract_inverted_index.reduce | 127 |
| abstract_inverted_index.scheme | 89, 174 |
| abstract_inverted_index.stage, | 166 |
| abstract_inverted_index.(MKFHE) | 82 |
| abstract_inverted_index.Private | 0 |
| abstract_inverted_index.adopted | 116 |
| abstract_inverted_index.between | 54 |
| abstract_inverted_index.dynamic | 97 |
| abstract_inverted_index.entrust | 35 |
| abstract_inverted_index.improve | 118 |
| abstract_inverted_index.library | 153 |
| abstract_inverted_index.meeting | 68 |
| abstract_inverted_index.offline | 165 |
| abstract_inverted_index.parties | 33 |
| abstract_inverted_index.privacy | 70, 108 |
| abstract_inverted_index.protect | 106 |
| abstract_inverted_index.require | 43 |
| abstract_inverted_index.typical | 6 |
| abstract_inverted_index.However, | 46 |
| abstract_inverted_index.academic | 29 |
| abstract_inverted_index.chunking | 136 |
| abstract_inverted_index.database | 20 |
| abstract_inverted_index.distrust | 53 |
| abstract_inverted_index.improved | 176, 189 |
| abstract_inverted_index.multiple | 32 |
| abstract_inverted_index.parties, | 56 |
| abstract_inverted_index.pressure | 162 |
| abstract_inverted_index.research | 30 |
| abstract_inverted_index.response | 170 |
| abstract_inverted_index.retrieve | 16 |
| abstract_inverted_index.scenario | 8 |
| abstract_inverted_index.traffic, | 130 |
| abstract_inverted_index.algorithm | 104, 114, 123 |
| abstract_inverted_index.construct | 85 |
| abstract_inverted_index.database. | 98 |
| abstract_inverted_index.efficient | 87 |
| abstract_inverted_index.encrypted | 10, 25 |
| abstract_inverted_index.excessive | 141 |
| abstract_inverted_index.mechanism | 95 |
| abstract_inverted_index.multi-key | 78 |
| abstract_inverted_index.providing | 22 |
| abstract_inverted_index.retrieval | 2 |
| abstract_inverted_index.scenario, | 31 |
| abstract_inverted_index.algorithm, | 83 |
| abstract_inverted_index.ciphertext | 135, 146 |
| abstract_inverted_index.computing, | 11 |
| abstract_inverted_index.efficiency | 171, 184 |
| abstract_inverted_index.encryption | 81 |
| abstract_inverted_index.inadequate | 66 |
| abstract_inverted_index.mechanisms | 65 |
| abstract_inverted_index.multi-user | 107 |
| abstract_inverted_index.permission | 93 |
| abstract_inverted_index.retrieval. | 45 |
| abstract_inverted_index.single-key | 64 |
| abstract_inverted_index.Experiments | 148 |
| abstract_inverted_index.application | 7 |
| abstract_inverted_index.competitive | 49 |
| abstract_inverted_index.efficiency, | 120 |
| abstract_inverted_index.homomorphic | 80, 132 |
| abstract_inverted_index.information | 1 |
| abstract_inverted_index.information. | 109 |
| abstract_inverted_index.optimization | 113 |
| abstract_inverted_index.transferring | 157 |
| abstract_inverted_index.verification | 94 |
| abstract_inverted_index.Specifically, | 99 |
| abstract_inverted_index.collaborative | 44 |
| abstract_inverted_index.communication | 129 |
| abstract_inverted_index.computational | 119, 161, 183 |
| abstract_inverted_index.relationships | 50 |
| abstract_inverted_index.requirements. | 71 |
| abstract_inverted_index.multiplication | 112, 133, 187 |
| abstract_inverted_index.multiplication. | 147 |
| abstract_inverted_index.vector–matrix | 111, 186 |
| abstract_inverted_index.public–private | 61 |
| cited_by_percentile_year.max | 95 |
| cited_by_percentile_year.min | 91 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 6 |
| citation_normalized_percentile.value | 0.9547528 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |