{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:13:58Z","timestamp":1772644438321,"version":"3.50.1"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ministry of Culture, Sports and Tourism, South Korea","award":["RS-2024-00332210"],"award-info":[{"award-number":["RS-2024-00332210"]}]},{"DOI":"10.13039\/501100014188","name":"Ministry of Science and ICT, South Korea","doi-asserted-by":"publisher","award":["RS-2024-00399491"],"award-info":[{"award-number":["RS-2024-00399491"]}],"id":[{"id":"10.13039\/501100014188","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2025.3648455","type":"journal-article","created":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T18:27:16Z","timestamp":1766687236000},"page":"217108-217125","source":"Crossref","is-referenced-by-count":1,"title":["Doubly Efficient Fuzzy Private Set Intersection for High-Dimensional Data With Cosine Similarity"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9134-979X","authenticated-orcid":false,"given":"Hyunjung","family":"Son","sequence":"first","affiliation":[{"name":"Department of Mathematics, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1105-1607","authenticated-orcid":false,"given":"Seunghun","family":"Paik","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0495-1628","authenticated-orcid":false,"given":"Yunki","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7767-4084","authenticated-orcid":false,"given":"Sunpill","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2489-6038","authenticated-orcid":false,"given":"Heewon","family":"Chung","sequence":"additional","affiliation":[{"name":"Department of Software Engineering, Jeonbuk National University, Jeonju, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0547-5702","authenticated-orcid":false,"given":"Jae Hong","family":"Seo","sequence":"additional","affiliation":[{"name":"Department of Mathematics, Hanyang University, Seoul, Republic of Korea"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00482"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52688.2022.01819"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00552"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP43922.2022.9746806"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21437\/interspeech.2022-126"},{"key":"ref6","article-title":"Clova baseline system for the VoxCeleb speaker recognition challenge 2020","author":"Heo","year":"2020","journal-title":"arXiv:2009.14153"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46466-4_15"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2021.3132163"},{"key":"ref9","first-page":"4904","article-title":"Scaling up visual and vision-language representation learning with noisy text supervision","volume-title":"Proc. Int. Conf. Mach. Learn.","author":"Jia"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2019.00521"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577348"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3397271.3401075"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2019.00042"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505665"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3459637.3482291"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219890"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2959100.2959190"},{"key":"ref18","first-page":"1","article-title":"Siamese neural networks for one-shot image recognition","volume-title":"Proc. ICML Deep Learn. Workshop","author":"Koch"},{"key":"ref19","volume-title":"FTC Warns About Misuses of Biometric Information and Harm to Consumers","year":"2023"},{"key":"ref20","volume-title":"The Biggest Data Breaches of the 21st Century","author":"Armerding","year":"2024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.2307\/j.ctvjghvnn","volume-title":"The California Consum. Privacy Act (CCPA): An Implement. Guide","author":"Bukaty","year":"2019"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00161"},{"key":"ref24","first-page":"1","article-title":"Realistic face reconstruction from deep embeddings","volume-title":"Proc. NeurIPS Workshop Privacy Mach. Learn.","author":"Vendrow"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3225430"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484760"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84245-1_14"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77886-6_31"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560658"},{"key":"ref30","first-page":"301","article-title":"Near-optimal oblivious key-value stores for efficient PSI, PSU, and volume-hiding multi-maps","volume-title":"Proc. USENIX Secur. Symp.","author":"Bienstock"},{"key":"ref31","volume-title":"Password Monitoring","year":"2025"},{"key":"ref32","volume-title":"Helping Organizations Do More Without Collecting More Data","year":"2019"},{"key":"ref33","volume-title":"Child Safety","year":"2025"},{"key":"ref34","first-page":"911","article-title":"Fuzzy labeled private set intersection with applications to private real-time biometric search","volume-title":"Proc. USENIX Secur. Symp.","author":"Uzun"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_12"},{"key":"ref36","first-page":"319","article-title":"Distance-aware private set intersection","volume-title":"Proc. USENIX Secur. Symp.","author":"Chakraborti"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-38557-5_19"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58740-5_12"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-68397-8_10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0938-3_2"},{"key":"ref41","first-page":"1","volume-title":"Fuzzy PSI via oblivious protocol routing","author":"Richardson","year":"2024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-95-5116-3_11"},{"key":"ref43","first-page":"1","volume-title":"Fast fuzzy PSI from symmetric-key techniques","author":"Zhang","year":"2025"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3719027.3744857"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70694-8_15"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_23"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15802-5_20"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64834-3_8"},{"key":"ref49","volume-title":"Official Python Wrapper for Openfhe","year":"2022"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3154794"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3523254"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690349"},{"key":"ref54","first-page":"215","article-title":"Batch pir and labeled PSI with oblivious ciphertext compression","volume":"2024","author":"Bienstock","year":"2024","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_2"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3557963"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134061"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243836"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3579856.3582817"},{"key":"ref60","first-page":"283","article-title":"Efficient unbalanced private set intersection cardinality and user-friendly privacy-preserving contact tracing","volume-title":"Proc. USENIX Secur. Symp.","author":"Wu"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-64840-4_29"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2022.3152591"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/PST58708.2023.10320155"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD61410.2024.10580653"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2025.3550059"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_1"},{"key":"ref67","article-title":"The apple PSI system","author":"Bhowmick","year":"2021"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2018.8698601"},{"key":"ref69","article-title":"Encrypted vector similarity computations using partially homomorphic encryption: Applications and performance analysis","author":"Serengil","year":"2025","journal-title":"arXiv:2503.05850"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2021.3139866"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3627673.3680017"},{"key":"ref72","first-page":"13995","article-title":"IDFace: Face template protection for efficient and secure identification","volume-title":"Proc. IEEE\/CVF Int. Conf. Comput. Vis.","author":"Kim"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TBIOM.2025.3545751"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0146"},{"key":"ref75","article-title":"CipherFace: A fully homomorphic encryption-driven framework for secure cloud-based facial recognition","author":"Serengil","year":"2025","journal-title":"arXiv:2502.18514"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3577923.3583656"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00004"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-8469-5_5"},{"key":"ref79","article-title":"Non-adaptive adversarial face generation","author":"Kim","year":"2025","journal-title":"arXiv:2507.12107"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.3389\/fimag.2025.1476377"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2001.959888"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_6"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_15"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3105111"},{"key":"ref86","first-page":"1","volume-title":"Adaptive successive over-relaxation method for a faster iterative approximation of homomorphic operations","author":"Moon","year":"2024"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3649476.3658724"},{"key":"ref88","first-page":"7948","article-title":"Post training 4-bit quantization of convolutional networks for rapid-deployment","volume-title":"Proc. Adv. Neural Inform. Process. Syst.","volume":"32","author":"Banner"},{"key":"ref89","first-page":"30318","article-title":"GPT3.int8 (): 8-bit matrix multiplication for transformers at scale","volume-title":"Proc. Adv. Neural Inform. Process. Syst.","volume":"35","author":"Dettmers"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.784"},{"key":"ref91","first-page":"1","volume-title":"Fully homomorphic encryption-based protocols for enhanced private set intersection functionalities","author":"Hu","year":"2023"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77287-1_2"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00411"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICCVW54120.2021.00166"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR52733.2024.00031"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR46437.2021.01035"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/ICB2018.2018.00033"},{"key":"ref98","first-page":"7","article-title":"Labeled faces in the wild: A database forstudying face recognition in unconstrained environments","volume-title":"Proc. Workshop Faces in\u2019Real-Life\u2019Images: Detection, Alignment, Recognit.","author":"Huang"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/WACV.2016.7477558"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2017.250"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E95.A.1366"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.21236\/ADA457144"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/11316118.pdf?arnumber=11316118","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T18:45:13Z","timestamp":1767206713000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11316118\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":102,"URL":"https:\/\/doi.org\/10.1109\/access.2025.3648455","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}