Author:
Zhao Fanyou,Teng Yiping,Yang Zheng,Xie Yuyang,Liu Jiayv,Qi Jiawei
Publisher
Springer Nature Singapore
Reference8 articles.
1. Viand, A., Jattke, P., Haller, M., Hithnawi, A.: HECO: fully homomorphic encryption compiler. In: USENIX Security 2023 (2023)
2. Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223–238. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48910-x_16
3. Cui, N., Yang, X., Wang, B., Li, J., et al.: SVKNN: efficient secure and verifiable k-nearest neighbor query on the cloud platform. In: ICDE, pp. 253–264. IEEE (2020)
4. Liu, A., Zheng, K., Li, L., Liu, G., Zhao, L., Zhou, X.: Efficient secure similarity computation on encrypted trajectory data. In: ICDE, pp. 66–77. IEEE (2015)
5. Teng, Y., Shi, Z., Zhao, F., Ding, G., Xu, L., Fan, C.: Signature-based secure trajectory similarity search. In: IEEE TrustCom, pp. 196–206 (2021)