Skip to main content

and
  1. No Access

    Article

    Security analysis of secure kNN and ranked keyword search over encrypted data

    Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner...

    Wakaha Ogata, Takaaki Otemori in International Journal of Information Security (2020)