Back to Results
First PageMeta Content
Ciphertext indistinguishability / Voronoi diagram / Chosen-plaintext attack / Cryptography / Homomorphic encryption / RSA


Secure Nearest Neighbor Revisited Bin Yao1 , Feifei Li2 , Xiaokui Xiao3 1 Department of Computer Science and Engineering, Shanghai Key Laboratory of Scalable Computing and Systems, Shanghai Jiao Tong University, China
Add to Reading List

Document Date: 2013-07-08 15:39:55


Open Document

File Size: 319,64 KB

Share Result on Facebook

Company

Wong / Hu / Google / Intel / Microsoft / the AES / Shanghai Key Laboratory / /

/

Event

FDA Phase / /

Facility

Square Grid / Shanghai Key Laboratory of Scalable Computing / University of Utah / Qhull library / Nanyang Technological University / Shanghai Jiao Tong University / /

IndustryTerm

query processing procedure / query processing / secure query processing / dot product / secure hardware / above algorithm / online technical report / /

OperatingSystem

Linux / /

Organization

University of Utah / Department of Computer Science / Shanghai Jiao Tong University / Nanyang Technological University / Singapore / School of Computing / School of Computer Engineering / /

Person

M . Our / /

Position

IND-CPA / guard / same security model / /

Product

Qhull / To remedy / /

ProgrammingLanguage

SQL / D / /

ProvinceOrState

Texas / California / /

Technology

encryption / detailed algorithm / cryptography / above algorithm / Relational Database / public-key encryption / Linux / symmetric-key encryption / secret key / order-preserving encryption / PIR protocol / /

SocialTag