Agarwal, P.K., Erickson, J., et al.: Geometric range searching and its relatives. Contemp. Math. 223, 1–56 (1999)
MathSciNet
CrossRef
Google Scholar
Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order preserving encryption for numeric data. In: Proceedings of the 2004 ACM SIGMOD, pp. 563–574. ACM (2004)
Google Scholar
Beaver, D.: Commodity-based cryptography (extended abstract). In: Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, 4–6 May 1997, pp. 446–455 (1997)
Google Scholar
Bost, R.: \(\sigma o \varphi o \varsigma \): forward secure searchable encryption. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1143–1154. ACM (2016)
Google Scholar
Bost, R., Minaud, B., Ohrimenko, O.: Forward and backward private searchable encryption from constrained cryptographic primitives. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1465–1482. ACM (2017)
Google Scholar
Cock, M.D., et al.: Efficient and private scoring of decision trees, support vector machines and logistic regression models based on pre-computation. IEEE TDSC 16(2), 217–230 (2019)
Google Scholar
Dowsley, R.: Cryptography based on correlated data: foundations and practice. Ph.D. thesis, Karlsruhe Institute of Technology, Germany (2016)
Google Scholar
Durak, F.B., DuBuisson, T.M., Cash, D.: What else is revealed by order-revealing encryption? In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 1155–1166. ACM (2016)
Google Scholar
Garay, J., Schoenmakers, B., Villegas, J.: Practical and secure solutions for integer comparison. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 330–342. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-71677-8_22
CrossRef
Google Scholar
Grubbs, P., Lacharité, M., Minaud, B., Paterson, K.G.: Learning to reconstruct: statistical learning theory and encrypted database attacks. In: 2019 IEEE Symposium on Security and Privacy, pp. 1067–1083 (2019)
Google Scholar
Guo, R., Qin, B., Wu, Y., Liu, R., Chen, H., Li, C.: MixGeo: efficient secure range queries on encrypted dense spatial data in the cloud. In: Proceedings of the International Symposium on Quality of Service, pp. 1–10 (2019)
Google Scholar
Guttman, A.: R-trees: a dynamic index structure for spatial searching. In: Proceedings of the 1984 ACM SIGMOD International Conference on Management of Data, SIGMOD 1984, pp. 47–57. ACM, New York (1984)
Google Scholar
de Hoogh, S.: Design of large scale applications of secure multiparty computation: secure linear programming. Ph.D. thesis, Department of Mathematics and Computer Science (2012)
Google Scholar
Kellaris, G., Kollios, G., Nissim, K., O’neill, A.: Generic attacks on secure outsourced databases. In: Proceedings of the 2016 ACM SIGSAC, pp. 1329–1340. ACM (2016)
Google Scholar
Kermanshahi, S.K., et al.: Geometric range search on encrypted data with forward/backward security. IEEE Trans. Dependable Secure Comput. 1–20 (2020)
Google Scholar
Kornaropoulos, E.M., Papamanthou, C., Tamassia, R.: Data recovery on encrypted databases with k-nearest neighbor query leakage. In: 2019 IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 19–23 May 2019, pp. 1033–1050 (2019)
Google Scholar
Lacharité, M.-S., Minaud, B., Paterson, K.G.: Improved reconstruction attacks on encrypted data using range query leakage. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 297–314. IEEE (2018)
Google Scholar
Li, X., Zhu, Y., Wang, J., Zhang, J.: Efficient and secure multi-dimensional geometric range query over encrypted data in cloud. J. Parallel Distrib. Comput. 131, 44–54 (2019)
CrossRef
Google Scholar
Luo, Y., Fu, S., Wang, D., Xu, M., Jia, X.: Efficient and generalized geometric range search on encrypted spatial data in the cloud. In: 2017 IEEE/ACM 25th International Symposium on Quality of Service (IWQoS), pp. 1–10. IEEE (2017)
Google Scholar
Markatou, E.A., Tamassia, R.: Database reconstruction attacks in two dimensions. Cryptology ePrint Archive, Report 2020/284 (2020). https://eprint.iacr.org/2020/284
Matoušek, J.: Geometric range searching. ACM Comput. Surv. (CSUR) 26(4), 422–461 (1994)
CrossRef
Google Scholar
Morton, G.M.: A computer oriented geodetic data base and a new technique in file sequencing. Technical report, IBM (1966)
Google Scholar
Naveed, M., Kamara, S., Wright, C.V.: Inference attacks on property-preserving encrypted databases. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 644–655. ACM (2015)
Google Scholar
Pan, Y., et al.: Data inference from encrypted databases: a multi-dimensional order-preserving matching approach. arXiv:2001.08773 (2020)
Sellis, T., Roussopoulos, N., Faloutsos, C.: The R+-tree: a dynamic index for multi-dimensional objects. Technical report, University of Maryland (1987)
Google Scholar
Shen, E., Shi, E., Waters, B.: Predicate privacy in encryption systems. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 457–473. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-00457-5_27
CrossRef
Google Scholar
Wang, B., Li, M., Wang, H.: Geometric range search on encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 11(4), 704–719 (2016)
Google Scholar
Wang, B., Li, M., Wang, H., Li, H.: Circular range search on encrypted spatial data. In: 2015 IEEE CNS, pp. 182–190. IEEE (2015)
Google Scholar
Wang, B., Li, M., Xiong, L.: FastGeo: efficient geometric range queries on encrypted spatial data. IEEE TDSC 16(2), 245–258 (2019)
Google Scholar
Wong, W.K., Cheung, D.W.-L., Kao, B., Mamoulis, N.: Secure kNN computation on encrypted databases. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of data, pp. 139–152 (2009)
Google Scholar
Xu, G., Li, H., Dai, Y., Yang, K., Lin, X.: Enabling efficient and geometric range query with access control over encrypted spatial data. IEEE Trans. Inf. Forensics Secur. 14(4), 870–885 (2019)
CrossRef
Google Scholar
Zheng, Z., Shen, J., Cao, Z.: Practical and secure circular range search on private spatial data. Cryptology ePrint Archive, Report 2020/242 (2020). https://eprint.iacr.org/2020/242
Zhu, H., Lu, R., Huang, C., Chen, L., Li, H.: An efficient privacy-preserving location-based services query scheme in outsourced cloud. IEEE Trans. Veh. Technol. 65(9), 7729–7739 (2015)
CrossRef
Google Scholar