Ciphertext-Only Attack on a Secure k-NN Computation on Cloud.
Shyam MurthySantosh Kumar UpadhyayaSrinivas VivekPublished in: INFOCOM (Workshops) (2024)
Keyphrases
- knn
- ciphertext
- standard model
- k nearest neighbor
- encryption scheme
- attribute based encryption
- cca secure
- public key encryption
- private key
- secret key
- diffie hellman
- nearest neighbor
- chosen plaintext attack
- proxy re encryption
- public key
- k nearest neighbour
- encryption algorithm
- distance function
- security analysis
- identity based encryption
- similarity search
- key distribution
- feature selection
- authentication protocol
- secure communication
- voting methods
- cloud computing
- authentication scheme
- neural network
- key management
- support vector machine
- security model
- range queries
- secret sharing scheme
- smart card
- data management
- digital signature
- data sharing
- relational databases
- nearest neighbour
- data sets