2023
DOI: 10.1109/tdsc.2022.3227141
|View full text |Cite
|
Sign up to set email alerts
|

Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(6 citation statements)
references
References 31 publications
0
4
0
Order By: Relevance
“…Contact Tracing. There are two mainstream contact tracing technologies, namely proximity-based solutions [3], [4], [5], [6], [7], [8], [9], [25], [26], [27], [28], [29] and location-based solutions [10], [11], [12], [13], [14], [15], [16], [17], [21].…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Contact Tracing. There are two mainstream contact tracing technologies, namely proximity-based solutions [3], [4], [5], [6], [7], [8], [9], [25], [26], [27], [28], [29] and location-based solutions [10], [11], [12], [13], [14], [15], [16], [17], [21].…”
Section: Related Workmentioning
confidence: 99%
“…Different from our work on efficient contact tracing over historical data, many works focus on developing the contact tracer as an administrative web-based system [11], a privacy-enhanced mobile application [10], [12], [15], or a decentralized Blockchain-based system [16]. Several works [13], [14], [17] consider the efficiency of close contact search. In particular, Chao et al [14] devise an iterative algorithm and a grid-based time interval tree to find contacted trajectories along the transmission chains.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, existing schemes [9,10] only support single or limited geometric ranges, such as circular, rectangular, or triangular ranges. While homomorphic encryption offers a viable approach for secure geometric range queries [11], the computational overhead associated with it is often unacceptable in practical scenarios. To achieve a fast search, Searchable Symmetric Encryption (SSE) [12][13][14] is commonly employed to enable secure and efficient retrieval of ciphertexts.…”
Section: Introductionmentioning
confidence: 99%