Asymmetric scalar product encryption for circular and rectangular range searches

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Although spatial database applications and location based systems require the execution of several types of searching operations over spatial data, works related to encrypted spatial data address a limited set of searching operations, restricting their use in real applications. This article proposes an encryption scheme that enables circular range search, rectangular range search and kNN operation over encrypted spatial data. Also, we have compared the encryption functions of our scheme with other encryption schemes and, even though the results have shown a similar performance, our work allows the execution of circular and rectangular range searches by using a unique encryption scheme.

Cite

CITATION STYLE

APA

Folha, R., Times, V. C., & Lopes, C. C. (2016). Asymmetric scalar product encryption for circular and rectangular range searches. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9809 LNCS, pp. 183–197). Springer Verlag. https://doi.org/10.1007/978-3-319-44039-2_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free