Ciphertext-Only Attack on a Secure k-NN Computation on Cloud.
Shyam MurthySantosh Kumar UpadhyayaSrinivas VivekPublished in: CoRR (2024)
Keyphrases
- knn
- ciphertext
- standard model
- k nearest neighbor
- encryption scheme
- attribute based encryption
- cca secure
- public key encryption
- private key
- secret key
- diffie hellman
- nearest neighbor
- chosen plaintext attack
- proxy re encryption
- public key
- k nearest neighbour
- identity based encryption
- encryption algorithm
- distance function
- cloud computing
- authentication scheme
- key management
- similarity search
- secure communication
- voting methods
- authentication protocol
- key distribution
- range queries
- smart card
- machine learning
- security analysis
- s box
- lossless compression
- neural network
- nearest neighbour
- sensitive data
- security model
- lightweight
- data management
- multi dimensional
- low cost