Abstract
The k-nearest- neighbor (kNN) algorithm is crucial in data mining and machine learning, yet its deployment on large-scale datasets within cloud environments presents significant security and efficiency challenges. This paper is dedicated to advancing the resolution of these challenges and presents novel contributions to the development of efficient and secure exact kNN query schemes tailored for spatial datasets in cloud-based location services. Addressing existing limitations, our approach focuses on accelerating query processing while ensuring robust privacy preservation and public verifiability. Key contributions include the establishment of a formal framework underpinned by stringent security definitions, providing a solid groundwork for future advancements. Leveraging Paillier’s homomorphic cryptosystem and public-key signature techniques, our design achieves heightened security by safeguarding databases, query access patterns, and result integrity while enabling public verification. Additionally, our scheme enhances computational efficiency through optimized data-packing techniques and simplified Voronoi diagram-based ciphertext index construction, leading to substantial savings in computational and communication overheads. Rigorous and transparent theoretical analysis substantiates the correctness, security, and efficiency of our design, while comprehensive experimental evaluations confirm the effectiveness of our approach, showcasing its practical applicability and scalability across datasets of varying scales.
1. Introduction
The k-nearest-neighbor (kNN) algorithm is a fundamental data mining and machine learning tool used for classification and regression tasks. It identifies the k closest points in a dataset to a given query point and makes decisions based on the properties of these points. In large-scale datasets, particularly those hosted in cloud environments, kNN queries present unique challenges and opportunities in terms of efficiency and privacy. When dealing with large-scale datasets, the computational and memory requirements for performing kNN queries can be substantial. The sheer volume of data can overwhelm local processing capabilities, making cloud-based solutions attractive due to their scalability and resource availability. However, distributing this process across a cloud infrastructure introduces latency and potential bottlenecks in data transmission and processing [1].
Privacy is a critical concern when sensitive data is processed or stored outside local premises, such as in cloud environments. Traditional kNN implementations may expose private data to cloud providers, increasing the risk of unauthorized access and breaches. The verifiability of query results is another significant concern. During information processing, a malicious cloud provider could conceal or alter information, leaving the user unsure about the accuracy of the results and unable to assess them with certainty. Therefore, it is crucial to design privacy-preserving and verifiable mechanisms that protect data and ensure the integrity of query results while still leveraging the cloud’s computational power. To address these challenges, many privacy-preserving and verifiable designs for kNN have been developed [2,3,4,5,6].
To ensure the confidentiality of data during the query process, a range of techniques are employed, including encryption, data anonymization, and secure multi-party computation. For instance, homomorphic encryption allows computations to operate on encrypted data, yielding encrypted results that are decipherable solely by the data owner [3]. Another method involves distributing data across multiple independent servers, each processing segments of the kNN computation without access to the underlying data or final query outcomes [7]. To ensure the verifiability of query results, existing approaches incorporate cryptographic hash functions and signature-based authentication technologies [3,8]. Moreover, to enhance query efficiency, protocols often integrate cryptographic methods with data-efficient structures and algorithms such as tree-based dimensionality reduction. This technique simplifies data while preserving essential characteristics relevant to kNN queries. Additionally, indexing techniques can be tailored to function with encrypted data, thereby reducing query response times without compromising security [9].
1.1. Related Works
In recent years, researchers have proposed various schemes to enable privacy-preserving and verifiable kNN queries on data outsourced to untrusted cloud servers. Depending on their security functionalities, cloud-assisted kNN schemes can be categorized as privacy-preserving or verifiable schemes.
Privacy-preserving kNN schemes without verifiability: Privacy-preserving cloud-assisted kNN schemes aim to protect user data while leveraging cloud resources for query processing. These schemes are essential in scenarios where sensitive data is stored in an honest-but-curious cloud and needs to be analyzed without compromising individuals’ privacy. Traditionally, a secret distance-preserving transformation (DPT) was used to ensure data privacy [10]. However, concerns were raised by Wong et al. [11] regarding vulnerabilities to known-sample attacks () and known-plaintext attacks () in DPT-based privacy-preserving kNN query schemes. In response, they proposed an asymmetric scalar product preservation encryption (ASPE) method. Hu et al. [12] introduced a kNN query processing scheme utilizing lightweight order-preserving encryption (OPE) and deterministic random encryption (DRE) to effectively support kNN queries of encrypted data. Unfortunately, subsequent analyses revealed vulnerabilities to chosen-plaintext attacks [13]. Choi et al. [14] and Wang et al. [15] adopted mutable order-preserving encryption (OPE) [16] to improve security. However, these schemes assumed mutual trust between the data owner (DO) and query user (QU), which introduced a serious risk of privacy disclosure of the DO’s key. Recognizing potential mutual distrust among the DO, QU, and cloud server (CS), Zhu et al. [17,18] proposed solutions for securely outsourcing kNN queries by using random blind techniques and Paillier’s additively homomorphic cryptosystem. However, their schemes were susceptible to known-plaintext attacks and failed to conceal data access patterns. Lei et al. [2] addressed outsourced kNN queries in spatial databases, employing vector-based projection technology for data preprocessing but sacrificing query accuracy. Subsequent improvements [19] aimed at enhancing accuracy but led to increased communication complexity. Further advancements highlighted insecurities in the ASPE method against ciphertext-only attacks [20], prompting the proposal of a 1NN scheme against adaptive chosen-keyword attacks, but it lacked support for secure kNN queries. Recently, Zheng et al. [21] introduced a privacy-preserving kNN query scheme based on asymmetric matrix encryption (AME), offering practicality and security, and Qi et al. [5] presented a privacy-aware kNN protocol under the dual cloud-server model, supporting dynamic data update operations. Despite these advancements, most methods do not consider the privacy of access patterns. To protect access patterns, works exploring the two (or more)-non-colluding cloud servers model have been pursued [22,23]. Elmehdwi et al. [22] designed a secure kNN query outsourcing scheme with Paillier’s homomorphic cryptosystem, achieving data, query, and result privacy at the cost of significant overhead on the QU side. Guan et al. [23] proposed a more efficient oblivious location-based kNN query scheme over the cloud, which is resistant to rainbow-location attacks.
Privacy-preserving kNN schemes with verifiability: Verifiable cloud-assisted kNN schemes focus on ensuring the correctness and integrity of query results obtained from the cloud. These schemes are crucial in scenarios where the cloud provider may be malicious or prone to errors. Compared with privacy-preserving designs for data in kNN queries, few works have focused on the verifiability of the query results. Yiu et al. [24] proposed a framework based on Voronoi MR trees, which is a variant of Merkle hash trees (MHT), to verify kNN query results and security zones. However, their design does not address data privacy, and most existing approaches relying on tree-based indexes leak access patterns. Moreover, Rong et al. [25] proposed the Verifiable Secure kNN (VSkNN) query scheme. However, their verifiable framework is probabilistic and they employed ASPE as the encryption scheme, which has previously been shown to compromise security [13] by exposing data and access pattern privacy to the cloud. Jiang et al. [26] proposed a verifiable dynamic searchable symmetric encryption scheme based on additive trees, but it only supports Boolean queries, not kNN queries. Therewith, Wu et al. [27] introduced ServeDB for secure and verifiable range queries, but it is not applicable to kNN queries, does not support access pattern privacy, and reveals data privacy in the verification results. For the first time, Cui et al. [9] proposed a secure and verifiable kNN query scheme called SVkNN, which uses Paillier’s additively homomorphic cryptosystem for privacy, Voronoi graphs for fast queries, and a hash-based message authentication code for verification. To address the efficiency issues identified in the work by [9], Liu et al. [3] proposed SecVKQ, a two-stage framework integrating edge servers to optimize query performance. Later, Cui et al. [8] further considered secure and verifiable kNN queries in multi-user settings and designed an effective scheme called MSVkNN, which employs a two-trapdoor public-key cryptosystem (DT-PKC) [28] for privacy and a hash-based message authentication code for verification. Recently, Zhang et al. [4] developed a secure kNN query scheme that integrates DT-PKC with random projection forests. This innovation not only enhances query efficiency but also ensures the privacy of data, queries, results, and access patterns while allowing for the verification of result correctness.
For transparency, we provide a comparison of the aforementioned works in terms of privacy, verifiability, the type of kNN employed, and the system models, as presented in Table 1.
1.2. Challenges and Contributions
As shown in Table 1, most existing schemes focus solely on data privacy, with only a few considering verifiability. Schemes that address both security properties simultaneously are relatively rare. Among these, most have one or more of the following limitations:
- Inability to protect the privacy of data access patterns [3].
- Use of probabilistic verification methods [7,25].
- Verification is limited to confirming the authenticity of the data source for the query results returned by the cloud.
- Support is limited to private verification, where the verification algorithm requires the involvement of a private key. This restricts verification to designated verifiers and leads to the inability to achieve accurate arbitration when disputes arise between the querier and the cloud server.
Consequently, designing a privacy-preserving, publicly verifiable scheme that simultaneously ensures data and access pattern privacy while achieving verifiable query results—including both the authenticity of the data source and the completeness of the results—remains a significant challenge.
Aiming at the above challenges, this paper builds on prior work to propose an efficient cloud-assisted kNN query scheme that guarantees data privacy while fulfilling the requirements of public verifiability. Specifically, compared to previous approaches, our contributions are notable in the following key aspects:
- Formal Framework Establishment and Rigorous Theoretical Analysis: Although numerous privacy-preserving or verifiable kNN query schemes exist, to the best of our knowledge, no strict formal definition of privacy-preserving, publicly verifiable kNN queries has been proposed. Our first contribution is the establishment of the first formal framework for this purpose, clearly identifying its fundamental components and security definitions. Additionally, we conduct a rigorous and detailed theoretical analysis of our proposed scheme designed within this framework, laying a robust foundation for future research and practical advancements in the field.
- Robust Privacy: By adopting the two-non-colluding cloud servers model and leveraging the semantic security of Paillier’s homomorphic cryptosystem along with the Voronoi diagram-based index structure, we design and integrate a series of secure computation algorithms. These include Secure Division Computation (SDC), Secure Grid Computation (SGC), Secure Nearest-Neighbor (SNN) search, and Secure Voronoi Cell Read (SCR). Together, these algorithms enable secure kNN queries, ensuring the privacy of the original dataset, query data, and query results while also preserving the privacy of data access patterns.
- Public Verifiability: By integrating Paillier’s homomorphic cryptosystem with public-key signature techniques and a Voronoi diagram-based index structure, our scheme enables public verification of the authenticity and completeness of query results. Unlike previous designs, which restricted verification to designated verifiers, our approach removes this limitation, allowing for accurate arbitration in disputes between the querier and the cloud server.
- Optimized Computational Efficiency: To ensure the correctness of encryption and decryption, the proposed scheme refines the parameters of a series of secure protocols integrated with data packing techniques, addressing the ambiguous and inaccurate descriptions in Cui et al.’s design [8]. Additionally, it optimizes the Voronoi diagram-based ciphertext index structure. These improvements result in significant computational and communication savings compared to prior schemes, thereby enhancing overall performance and contributing to scalability and practical applicability in real-world scenarios.
1.3. Layout of This Paper
The remainder of this paper is organized as follows. Section 2 describes the system model and the associated security definitions. Section 3 covers the necessary preliminaries. Our main computation outsourcing protocol is detailed in Section 4. In Section 5, we analyze the correctness and security of the proposed protocol. Section 6 presents a theoretical efficiency analysis and a practical performance evaluation. Finally, we summarize our findings in Section 7.
2. System Architecture, Threat Models, and Design Goals
2.1. System Architecture and Threat Models
Following the setup of prior verifiable designs, our kNN query system over a cloud dataset, as illustrated in Figure 1, involves four entities: the data owner (DO), the query user (QU), and two cloud servers (CS1 and CS2). The DO possesses a large-scale spatial dataset , and the QU issues a kNN query to the DO’s dataset. Due to limited storage and computing resources, the DO offloads the storage and associated computation tasks to the cloud servers while maintaining the privacy of the dataset. CS1 and CS2 are two non-colluding, resource-abundant, yet potentially untrusted cloud servers. To protect the privacy of the spatial dataset and support efficient kNN search operations, the DO must determine an appropriate blinding method and an efficient data structure to encrypt and organize the dataset . Also, the design should ensure that the QU can verify the integrity and correctness of the cloud returned query result. Formally, the framework of the privacy-preserving publicly verifiable kNN query scheme, denoted as PVkNN = (Setup, DSEnc, QuEnc, Search, Verify, ResDec), consists of the following six algorithms:
- : Given a security parameter and dataset size n, this algorithm generates the public key and the secret key .
- : On inputting the dataset , the public key , and the secret key , the DO encrypts the dataset into a ciphertext dataset , where denotes the label set.
- : On inputting the query data point Q and the public key , this algorithms generates the encrypted query point .
- : On inputting the encrypted query , the encrypted dataset , and the public key , the search algorithm finds the query result and the associated proof .
- : On inputting the encrypted query , the query result , the proof , and the key pair , the verification algorithm checks whether is authentic and complete, producing an output .
- : With the query Q, the query result , the secret key and the indicator , if , this algorithm decrypts the returned result and recovers the set of k-nearest neighbors to Q. Otherwise, it rejects and outputs .
In this kNN query system, the security threat mainly comes from untrustworthy cloud servers or malicious queriers. In our design, we consider the following three threat behaviors: (1) the cloud servers are curious and may attempt to infer confidential information, such as the dataset, the query access pattern, and the query result; (2) the cloud servers are malicious and may deliberately tamper with the query result for financial incentives; and (3) the querier is malicious and may forge a false query result and attribute it to the cloud servers.
Remark 1.
It should be noted that the two-non-colluding cloud servers framework is reasonable in practice. For well-established cloud service providers such as Amazon AWS, Microsoft Azure, or Huawei Cloud, it is highly unlikely that any two of these companies would collude to damage their invaluable reputations. Also, this setup has been extensively employed in secure kNN query scenarios [3,4,5,7,8,9,22,25].
2.2. Design Goals
Considering our system architecture and threat models, we aim to design a secure and efficient kNN query protocol. Specifically, our design should meet the four requirements outlined below.
2.2.1. Correctness
Generally, correctness means that if the cloud servers perform the specified computation task, the design should ensure that an honest querier can finally obtain the k-nearest neighbors to his/her query data point. The formal definition is presented below.
Definition 1 (Correctness).
A scheme is correct if, for any given security parameter λ, , , , and are honestly performed, the probability
where is a negligible function of λ.
2.2.2. Public Verifiability
In the context of verifiable kNN queries, verifiability refers to the ability to verify the authenticity and completeness of the query results returned by the cloud server. Specifically, this involves confirming whether the data in the query result was indeed uploaded by the DO and whether it corresponds precisely to the ciphertext of the k-nearest neighbors to the query point. Verification is considered private if it requires private keys, meaning that only the designated user who possesses the private keys can perform the verification [30,31]. Conversely, verification is public if it relies on public keys and can be performed by any entity [32,33,34]. Clearly, compared to private verifiability, public verifiability provides a more transparent verification mechanism. When disputes arise between the querier and the cloud server regarding the query results, public verifiability ensures the prompt resolution of such conflicts. Here, we define public verifiability using a private-key-independent verification algorithm called Verify, which guarantees that the probability of a cloud server successfully deceiving a verifier into accepting an incorrect result—either inauthentic or incomplete—is negligible. The formal definition is presented below.
; |
; |
Definition 2 (Public Verifiability).
Let be a protocol, and let be a probabilistic polynomial-time (PPT) machine. We say that protocol is publicly verifiable if
where .
2.2.3. Privacy
Our design aims to protect the privacy of the following information: the dataset, the query data, the query result, and query access pattern. The following privacy aspects are considered:
- Dataset privacy. Cloud servers cannot obtain any valuable information about the plaintext data in the dataset .
- Query data privacy. The QU’s query data should not be revealed to cloud servers.
- Query result privacy. Apart from the QU, other participants cannot learn the plaintext query result.
- Access pattern privacy. The identifiers corresponding to the k-nearest neighbors of the query point should not be revealed to the QU and the cloud servers (to prevent any inference attacks) [8,9,22].
In our analysis, we establish the privacy of our design by demonstrating the indistinguishability between the simulation model and the real model.
2.2.4. Efficiency
High efficiency is a generic requirement for any practical protocol. Under the premise of ensuring security, the design should reduce each participant’s computational and communication overheads as much as possible. Specifically, we should design an efficient index structure to support frequent query operations.
3. Preliminaries
3.1. Notations
For ease of description, we describe the frequently used notations in Table 2.
3.2. Permutation
Given a natural number , mathematically, a permutation is a bijection over the set . Generally, it can be represented as
where is some rearrangement of . For some m-tuple , we define .
3.3. Paillier’s Additively Homomorphic Cryptosystem
The well-known Paillier additively homomorphic cryptosystem [35] was proposed by Paillier in 1999. For some message , its encryption function E is denoted as where N, which is public, is the product of two large prime numbers p and q, and is randomly chosen. The decryption function D with the secret key is
The Paillier cryptographic system exhibits the following properties:
- Homomorphic addition: The decrypted product of two ciphertexts equals the sum of their corresponding plaintexts, and the decrypted kth power of a ciphertext equals the product of k and its corresponding plaintext.
- Semantic security: If the decisional composite residuosity problem is hard, then the Paillier cryptosystem is -secure.
3.4. Digital Signature Algorithm DSA
The Digital Signature Algorithm (DSA) is a standard algorithm for digital signatures and is a public-key cryptosystem based on the discrete logarithm problem [36]. For two large prime numbers p and q satisfying , let be an element of order q, and for some randomly chosen . Then, the signature key is , and the verification key is . For a message m, its signature is , where, for some randomly chosen ,
and is a public hash function. Given , the verification algorithm proceeds as follows: (1) Verify . (2) Calculate , , , and . (3) The algorithm outputs “1” (the signature is valid) if . Otherwise, it outputs “0”.
3.5. Voronoi Diagram
Given a dataset consisting of n points in the plane, the Voronoi region of the point refers to the set of all points in the plane closer to than to any other point in . Precisely,
Equivalently, for any , let denote the half-plane, and we have . The point is called a Voronoi-relevant vector of if and only if and share a boundary line. The set of these Voronoi-relevant vectors is generally denoted as .
Lemma 1
([37]). Given a dataset and a query point Q, the nearest neighbor of the query point Q is P if and only if .
Lemma 2
([38]). Let be the k -nearest neighbors of a given query point Q. Then, .
3.6. Data Packing with Paillier’s Cryptosystem
For a large-scale dataset, to encrypt and decrypt each data point item by item is time-consuming. To improve encryption/decryption efficiency, Liu et al. [39] introduced a data-packing encryption/decryption technique. Here, we present their design with Paillier’s cryptosystem. For -bits integers with , unlike traditional methods that encrypt them into item by item, the data-packing technique encrypts them into a single ciphertext, which contains the following four algorithms:
- Data packing :
- Data encryption :
- Data decryption :
- Data unpacking : for where denotes the binary bits between the th position and the th position of x counting from the least significant bit.
The correctness of the data decryption follows the fact that, since ,
The condition is critical to guarantee the equivalence
as it ensures that the summation remains strictly smaller than the modulus N, thereby avoiding modular reduction. Also, if we know the ciphertext , we can get the ciphertext by using the homomorphic property, i.e.,
4. Our Main Design
4.1. Design Intuition and Basic Idea
Inspired by [8,9], we adopt Paillier’s homomorphic cryptosystem to preserve the privacy of the dataset and the query data, as well as the “baby-step–giant-step” strategy to construct an efficient index data structure. Specifically, the spatial dataset is initially divided into several large rectangular regions, and each rectangle is further represented using a refined Voronoi diagram-based index. During the kNN search, we first perform a giant step to locate the target rectangular region, followed by a baby step to traverse the Voronoi diagram-based index and identify the individual points. To enable efficient search operations over the ciphertext dataset, we develop a series of secure protocols by integrating Paillier’s homomorphic encryption algorithm with the data-packing techniques, building upon previous designs. These protocols include the Secure Division Computation (SDC), Secure Grid Computation (SGC), Secure Nearest-Neighbor (SNN) search, and Secure Voronoi Cell Read (SCR) protocols, collectively enabling secure kNN queries. Since Paillier’s cryptosystem operates in a ring modulo a large integer and the data-packing technique is sensitive to parameter selection, we refine and tighten the previous designs to ensure correctness and optimize computational efficiency. This involves optimizing the index structure, improving parameter selection strategies, and addressing ambiguous or inaccurate descriptions. More importantly, previous designs lack support for public verifiability. In their approaches, the DO needs to send a secret verification key to the QU through a secure channel, or an additional Certified Authority (CA) is needed to generate and distribute keys through secure channels. To avoid the above-mentioned strong security assumption, as well as to prevent a malicious querier from forging a false query result and attributing it to the cloud servers, we integrate a public-key signature scheme with the Voronoi diagram-based index. This ensures both the authenticity and completeness of the query results while supporting public verifiability.
4.2. Our Main Outsourcing Protocol
4.2.1. DO Dataset Preprocessing Stage
This stage, carried out by the DO, is a one-time process. Assume that the spatial dataset , where each element comprises an identifier () i, and its corresponding point . With loss of generality, we bound and for any , and . The aim of this stage is to construct two indexes ( and ) with the following steps:
- Given a natural number m of appropriate size, the DO divides the region into small rectangular regions for .
- For each point , the DO finds its Voronoi-relevant vectors
- The DO constructs the index , where refers to a subset of and, for any point , .
- The DO constructs the index .
4.2.2. System Setup Stage:
This stage is also performed by the DO and is a one-time task. Given a security parameter , the DO first invokes the key-generation algorithm in Paillier’s homomorphic cryptosystem to generate two random large prime numbers p and q with the same bit length and calculates . Then, the DO generates the signature-verification key pair for the DSA. Finally, the DO publishes the public key and keeps the private key secret.
4.2.3. Dataset Encryption Stage:
This stage is performed by the DO and is a one-time task. As shown in the example illustrated in Figure 2, with the public key for encryption and for signature, the DO takes and encrypts the dataset into with
Here, for ,
with for and . Specifically, if the number of points contained in some grid is less than , we can pad several random points chosen from . For ,
are buckets, each bucket consisting of w three-tuples. Specifically, for the last bucket , we pad the subscripts with some random data points if it contains no more than w three-tuples. Moreover, for any , . Similarly, if the number of points contained in some is less than , we can pad several random points chosen from . Finally, the DO uploads to CS1 and the private key to CS2.
4.2.4. QU Query Encryption Stage:
This stage is performed by the QU. When the QU issues a kNN query request , he/she encrypts it into with the public key and then queries CS1 with .
4.2.5. CS Search Stage:
This stage is cooperatively performed by the two non-colluding cloud servers CS1 and CS2 and is a query-based one-time operation. Algorithm 1 presents the details. In general, this stage proceeds as follows:
Algorithm 1 kNN () |
Input: CS2: the public-private key pair |
Output: Result sets , , and verification sets , |
|
- (1)
- With the inputs , , and , and the public–private key pair , cloud servers and interact with each other to calculate the ciphertexts and using Algorithm 2.
- (2)
- With the inputs and , cloud servers and collaborate to execute Algorithm 3, traversing to locate the target grid with , which means that . The core idea of this algorithm is to determine based on verifying whether both and represent ciphertexts of 0 for some . Note that may be negative; the parameter T ensures that ensures that the results represents a ciphertext of a positive number.
Algorithm 2 SDC () |
Input: : , and a security parameter , : . |
Output: obtains the quotients and |
|
Algorithm 3 SGC () |
Input: : , and security parameters satisfying , : |
Output: the grid with and |
1: |
2: for to do |
3: generates random numbers with bits and a random number |
4: calculates |
5: |
6: for to do |
7: for to do |
8: generates a random numbers and calculates |
9: computes |
10: |
11: permutes the vectors and grid with two random permutations : |
12: |
13: |
14: packs , i.e., calculates and sends to |
15: decrypts and unpacks and : |
16: for to do |
17: for to do |
18: if and |
19: |
20: |
21: |
22: else |
23: sends and to |
24: permutes the matrix M with : |
25: calculates |
26: gets the target grid containing the query point: |
- (3)
- After identifying the correct grid , cloud servers CS1 and CS2 jointly execute Algorithm 4 to search within the grid in ciphertext form and locate the ciphertext () corresponding to the nearest neighbor to Q, where . It is worth noting that Algorithm 4 can trivially be adapted to handle scenarios where the input includes multiple packed ciphertext datasets and multiple ciphertext values. Specifically, the input format is , and the output is the ciphertext , where represents the nearest-neighbor point to Q, with the constraint that .
Algorithm 4 SNN () |
Input: : , and , : the private key |
Output: (): the ciphertext of the nearest neighbor to Q with |
|
23: |
|
- (4)
- According to Lemma 2, the second-nearest neighbor to Q resides in the set . Therefore, leveraging , cloud servers and collaboratively execute Algorithm 5 to explore and identify . These results facilitate the discovery of the second-nearest neighbor and verification of the correctness of .
Algorithm 5 SCR () |
Input: : , and . : the public-private key pair |
Output: and in |
|
- (5)
- Similarly, the jth () nearest neighbor to Q is in the set . Thus, for to k, cloud servers and recursively perform the following operations. First, they jointly invoke Algorithm 4 to traverse and find the ciphertext () of the jth nearest neighbor to Q. Then, they jointly perform Algorithm 5 to search in the ciphertext form and find , which is used to find the th nearest neighbor and verify the correctness of .
- (6)
- Through the above five steps, can obtain the encrypted query result and the encryption verification information
4.2.6. QU Verification and Decryption Stage: and
After receiving the from CS1 and from CS2, the QU performs Algorithm 6 to verify the correctness of the query result. If the verification algorithm returns , the QU treats the set in Equation (2) as the final query result. Otherwise, the QU rejects the result.
Algorithm 6 Verify () |
Input: . |
Output: or |
|
5. Correctness and Security Analysis
5.1. Correctness Analysis
In this section, we analyze the correctness of our proposed protocol. First, we prove the correctness of each algorithm.
Lemma 3.
Algorithm 2 is correct. That is, for any valid input , , and ,
can indeed obtain the ciphertexts and .
Proof.
See Appendix B.1. □
Lemma 4.
Algorithm 3 is correct. That is, for any valid input , , and ,
can indeed obtain the target grid with .
Proof.
See Appendix B.2. □
Lemma 5.
Algorithm 4 is correct. That is, for any valid input , , , and ,
can indeed obtain the ciphertext () such that , and is the nearest-neighbor point to Q with .
Proof.
See Appendix B.3. □
Lemma 6.
Algorithm 5 is correct. That is, for any valid input , , and ,
can indeed obtain and in .
Proof.
See Appendix B.4. □
Lemma 7.
If
and
faithfully execute Algorithm 1, then, for any , the difference between the jth element in (resp. ) and that in (resp.) satisfies
where is exactly the jth nearest neighbor to Q, is the set of Voronoi-relevant vectors of , and is the signature of .
Building on the foundation provided by the aforementioned lemmas, we are able to establish the correctness of our protocol.
Theorem 1.
According to Definition 1, our protocol is correct. That is, if the cloud servers are honest, an honest QU can get the exact k-nearest neighbors to the query point Q.
Proof.
As outlined in Definition 1, establishing correctness merely requires demonstrating that Algorithm 6 indeed returns and that is exactly the jth nearest neighbor to Q. In fact, by Lemma 7, the set (resp. ) in Algorithm 6 is
where is indeed the jth nearest neighbor to Q, is the set of Voronoi-relevant vectors of , and is the signature of . Therefore, in Step 5, the signature of the message will pass the verification algorithm. Moreover, in conjunction with Lemma 2, we know that, after the for-loop in Step 9, will pass the distance verification. That is, Algorithm 6 will return and is correct. □
5.2. Public Verifiability
Theorem 2.
If the hash functions and the signature algorithm are secure, then our protocol achieves public verifiability, as defined in Definition 2. That is, the advantage probability
that the adversary obtains in the experiment is negligible.
Proof.
According to Definition 2, we only need to analyze the probability of the event that the experiment outputs 1, which means that in Algorithm 6 and .
In essence, the event entails two conditions:
- (1)
- In Step 4, is the correct signature of the message .
- (2)
- In Step 15, .
Furthermore, condition (1) implies that are the data points from the DO and are the Voronoi-relevant vectors of . Condition (2) implies that is the jth nearest neighbor of Q. Consequently, the output of the decryption algorithm yields . In simpler terms, . □
5.3. Privacy
For privacy analysis, we leverage the formal definition of multiparty computation, as outlined in [39,40], within the framework of the simulation paradigm [41]. The overarching concept is described below.
Theorem 3.
(Composition Theorem [41]) Given a protocol Ω composed of several sub-protocols, if all sub-protocols are secure and all intermediate results are either random or pseudorandom, then the protocol Ω is secure.
In the simulation paradigm, it is essential that the perspective of each participating party in a protocol can be replicated based solely on its input and output. This requirement ensures that parties do not gain any additional information from the protocol beyond what their inputs and outputs imply. In other words, the simulated view of each sub-protocol must be computationally indistinguishable from the actual execution view. To illustrate this concept, we formally demonstrate the security of the SDC protocol (Algorithm 2). Although we focus on the SDC protocol here, other protocols can be elucidated in a similar manner.
Theorem 4.
If the hash functions and Paillier’s homomorphic cryptosystem are secure, then the protocol is secure. That is, for any probability polynomial-time adversary , there exists a simulator such that the probability is negligible, i.e.,
Proof.
We first define the real view and the simulated view .
: With the inputs , , and a security parameter . CS1 first generates two random numbers and then calculates , , , . Then, it sends and to . first decrypts them as and and calculates the quotients and . Then, encrypts , and sends to CS1. Finally, calculates the quotients and .
: The simulation contains two simulators . first chooses four random numbers and calculates and . Then, it generates two random numbers and and calculates . Finally, it sends to . first chooses four random numbers and decrypts them as . Then, calculates the quotients and and sends to . Finally, calculates the quotients and .
Since Paillier’s homomorphic cryptosystem is semantically secure, for any two invalid plaintexts and , no probability polynomial-time (PPT) adversary can distinguish their ciphertexts and . That is, in the simulated view is computationally indistinguishable from in the actual view. Similarly, is computationally indistinguishable from . Therefore, the output distribution of the simulated view and that of the real view are computationally indistinguishable. In other words, the adversary cannot trace back to the corresponding data records, which preserves the privacy of the dataset and access patterns. To sum up, the SDC protocol is secure. □
Similarly, we can prove that the kNN (Algorithm 1), SGC (Algorithm 3), SNN (Algorithm 4) and SCR (Algorithm 5) protocols are secure under our security model; thus, according to the composition theorem, we can obtain the following theorem.
Theorem 5.
If the hash functions and Paillier’s homomorphic cryptosystem are secure, our protocol achieves dataset privacy, query data privacy, query result privacy, and access pattern privacy.
Remark 2.
For clarity, we use access pattern privacy as an example and provide an intuitive explanation. That is, the identifiers corresponding to the k-nearest neighbors of the query point are kept confidential from both the cloud servers and the querier
QU . In fact, during the kNN search process (as described in Algorithm 1), cloud server
receives the encrypted data , while cloud server
receives the blinded data . Here, , where are uniformly random numbers owned by
. The decryption key is owned by
, and since
and
are assumed to be non-collusive, the identifier remains concealed from both cloud servers. The privacy of against the querier
QU is clear. As shown in Steps 25 and 26 of Algorithm 1, the query results and received by the
QU contain no information about .
6. Efficiency Analysis and Performance Evaluation
In this section, we present a comprehensive efficiency evaluation of our scheme from both theoretical and practical perspectives.
6.1. Evaluation Methodology
A widely recognized methodology for assessing the efficiency of a new scheme is to compare it against prior designs. However, it is unfair and meaningless to compare the efficiency of two schemes without considering the different system models and security intentions. Ideally, a well-constructed scheme should satisfy two conditions: (1) it outperforms earlier designs that offer the same or fewer security guarantees, and (2) any previous designs delivering higher security levels should exhibit significantly lower efficiency.
Since our new scheme simultaneously considers two secure functionalities—privacy and verifiability—Table 1 highlights existing schemes that also address these functionalities concurrently. These schemes include those proposed by Rong et al. [25], Sundarapandi et al. [7], Liu et al. [3], Zhang et al. [4], Cui et al. [9], and Cui et al. [8]. It is worth noting that Rong et al.’s and Liu et al.’s schemes fail to preserve the privacy of data access patterns. Furthermore, the verification approaches in Rong et al.’s scheme [25] and Sundarapandi et al.’s scheme [7] are probabilistic. Zhang et al.’s scheme [4], on the other hand, only supports verifying the authenticity of the query results. As for Cui et al.’s scheme [9], the authors themselves evaluated it in [8] and found it to have lower efficiency and unsatisfactory performance. Additionally, Cui et al. [8] comprehensively evaluated their proposed scheme called , demonstrating its efficiency advantages over previous designs. Therefore, based on our two comparison principles, we only need to evaluate the efficiency of our scheme relative to the currently most efficient scheme [8].
6.2. Theoretical Analysis
For ease of description, we first introduce some necessary notations. The time complexities of encryption and decryption in Paillier’s HE cryptosystem and DT-PKC [28] are almost the same: . Let and denote the time cost of one multiplication in or and the time cost of one division of two integers less than N, respectively. Considering that the encryption and decryption time complexities in both Paillier’s HE cryptosystem and DT-PKC [28] are nearly identical, both at , we denote the time cost of a single encryption operation as and the time cost of a single decryption operation as in either Paillier’s HE cryptosystem or DT-PKC. Moreover, and refer to the time cost of one signature operation and oce verification operation in the DSA, respectively. With these notations, we initially analyze the theoretical computational and communication costs of each algorithm in Table 3 and Table 4, respectively. Subsequently, we compare the theoretical computational cost of our protocol with that of Cui et al.’s protocol [8] in Table 5, along with the communication cost in Table 6.
6.3. Experimental Analysis
To comprehensively evaluate the practical performance of the proposed scheme, we conducted experimental comparisons of the time and communication costs between our design and Cui et al.’s protocol [8] across multiple dimensions, including but not limited to the dataset size, grid granularity m, query parameter k in kNN, and size of security parameter modulus.
All experiments were conducted on a laptop featuring an Intel® CoreTM i5-8250U CPU (1.60 GHz, with eight logical cores, Hewlett-Packard, Palo Alto, CA, USA) with 8GB of RAM, running on Windows 10. The implementations were developed in Java using the JCA Library. Furthermore, we adopted the NIST-recommended parameters for the Digital Signature Algorithm (DSA), where the prime modulus p and subgroup order q were configured with bit lengths of 1024 and 160, respectively. Subsequently, we analyzed the impact of the following parameters:
- (1)
- Impact of varying n: With fixed parameters , , and , we systematically varied the dataset size n from 1000 to 20,000 to evaluate scalability. Table 7 presents the stage-wise execution times for both Cui et al.’s protocol [8] and our proposed protocol. Visually, Figure 3 further illustrates the comparative trends in the total cost of these two protocols as n increases. The results demonstrate that our protocol achieved a 58.5–65.5% reduction in time cost compared to the baseline, with the performance gap widening significantly for larger n.
- (2)
- Impact of varying m: Under fixed parameters , , and , we systematically evaluated the grid granularity to analyze algorithmic scalability. Table 8 presents a comparative analysis of computational latency (in seconds) between Cui et al.’s protocol [8] and our proposed method across these configurations. As shown in the table, the total cost of our design was about 32.7–35.4% of that of the baseline. Furthermore, as the grid granularity m primarily influences the search stages, Figure 4 visualizes the combined latencies of these phases. Notably, minimal computational overhead was achieved at , aligning closely with the theoretical optimum derived for uniform random datasets:
- (3)
- Impact of varying k: As shown in Table 9, under fixed parameters , , and , we systematically evaluated the computational efficiency of each stage of our protocol against Cui et al.’s baseline [8] by varying the query parameter k in k-nearest-neighbor (kNN) searches from 1 to 10. Further, since the search, verification, and decryption stages are inherently dependent on k, whereas the setup, dataset encryption, and query encryption stages remain protocol-level invariants independent of k, Figure 5 illustrates the variance of the time cost of these two stages as k increases, demonstrating that the efficiency gains of our design became more pronounced as k increased.
- (4)
- Impact of varying K: Given that the modulus size K of N determines the security strength of both the DT-PKC and Paillier cryptosystems employed in our scheme, we conducted a comprehensive performance comparison between our proposed scheme and Cui et al.’s protocol [8] under varying security levels () for fixed parameters , , and . Table 10 presents the stage-wise computational latencies (e.g., setup, encryption, search, and verification) for both schemes, explicitly quantifying the trade-off between cryptographic robustness and operational efficiency. Also, Figure 6 illustrates the total execution time scaling with increasing K, showing that the total cost of our design was about 33.8–38.1% of that of Cui et al.’s protocol.
- (5)
- Communication cost: We conducted an experimental evaluation of communication costs with fixed parameters, , , and , while systematically varying the dataset size n. As shown in our theoretical analysis (Table 6), the primary difference in communication cost between our protocol and Cui et al.’s protocol occurred during the stage. Figure 7 illustrates the difference in communication overhead between and in our protocol compared to Cui et al.’s protocol across various dataset sizes. The polyline in Figure 8 represents the comparison of data transfer times between CS1 and CS2 during the Search phase across varying dataset sizes. The data transfer time (communication latency) was calculated as the communication volume divided by the transfer rate, with the transfer rate simulated as 390 Mbps ≈ 48.75 MB/s. Our findings demonstrated that our protocol incurred lower costs, consistent with our theoretical analysis.
Table 7.
Time cost comparison on synthesized datasets with different sizes of 1000, 5000, 10,000, and 20,000 (unit: seconds).
Table 8.
Time cost comparison with different grid granularities on a synthesized dataset of size 2000 (unit: seconds).
Table 9.
Time cost comparison with different query parameters k on a synthesized dataset of size 2000 (unit: seconds).
Table 10.
Time cost comparison with different key sizes on a synthesized dataset of size 2000 (unit: seconds).
7. Conclusions
This paper presents our investigation and proposal of a faster, privacy-preserving, and publicly verifiable protocol for exact k-nearest-neighbor queries, termed PPVkNN. Leveraging Paillier’s homomorphic encryption and a series of meticulously designed secure protocols, PPVkNN not only supports exact kNN query functionality but also preserves the privacy of data, queries, results, and query access patterns. Furthermore, it guarantees result correctness and enables public verification. Theoretical analysis confirms the correctness and security of our proposed protocols. Additionally, efficiency analysis and performance evaluation demonstrate significant computational and communication savings compared to prior works, enhancing the practicality of our scheme.
Author Contributions
J.L. and C.T.: Conceptualization, methodology, validation, investigation, resources, supervision, project administration, visualization, and writing—original draft preparation; Y.S. and W.T.: Formal analysis, data curation, writing—review and editing, and visualization. All authors have read and agreed to the published version of the manuscript.
Funding
This research was partially supported by the Natural Science Foundation of Shandong Province (ZR2022MF250), the National Natural Science Foundation of China (61702294), and the Natural Science Foundation of Top Talent of SZTU (GDRC202214).
Data Availability Statement
The raw data supporting the conclusions of this article will be made available by the authors on request.
Acknowledgments
The authors would like to thank the editor and the three anonymous referees for their careful reading of this article and their constructive suggestions, which considerably improved this article.
Conflicts of Interest
The authors declare no conflicts of interest.
Appendix A
Table A1.
Notations.
Parameter | Description |
---|---|
a permutation function | |
the plaintext spatial dataset | |
the ciphertext spatial dataset | |
the least common multiple of two integers a and b | |
Q | is the query data point |
the index of the jth nearest neighbor to Q | |
denotes the jth | |
nearest neighbor to Q | |
the set of Voronoi-relevant vectors of | |
a cryptographic hash function | |
the signature algorithm in DSA | |
N | a large integer that is the product of two |
prime numbers p and q | |
K | the size of N |
the multiplication group of the residue | |
class modulo | |
the residue class ring modulo N | |
the concatenation of two numbers x and y | |
the greatest integer, no larger than x | |
the set | |
the set | |
the security parameter | |
a negligible function of the security parameter | |
n | the dataset size |
m | the grid granularity |
k | the query parameter |
the number of lines in one bucket | |
the number of packed points |
Appendix B
Appendix B.1. The Proof of Lemma 3
Proof.
In Algorithm 2, due to the homomorphic property of Paillier’s cryptosystem, we know that
Thus, Since and are at most bits, and and are at most bits, while N is bits, with the security parameter satisfying , we have Then,
Consequently, the output is
□
Appendix B.2. The Proof of Lemma 4
Proof.
According to the homomorphic property of Paillier’s cryptosystem and the data-packing technique, from Step 2 of Algorithm 3, we know that
and, in Step 9 of Algorithm 3, we have Thus, in Step 11,
and, in Step 14,
Also, in Step 15, according to the property of the data-packing technique, as long as
we have
Since and are at most bits, and and m are at most bits, with and , the conditions (Equations (A1)–(A4)) hold. Subsequently, in Step 18, the decisional conditions and mean that and . Consequently, in Step 25,
with
and
In the last step (Step 26),
□
Appendix B.3. The Proof of Lemma 5
Proof.
Due to the homomorphic properties of Paillier’s cryptosystem and the data-packing technique, we know that
Thus,
Since are at most bits, , and are at most bits, and the security parameters and satisfy and , we have
Subsequently, after the for-loop in Step 20, we have
and, in Step 28,
Therefore, in the last step (Step 29), by the homomorphic property,
□
Appendix B.4. The Proof of Lemma 6
Proof.
According to the homomorphic property, in Step 3, we know that for ,
and, in Step 7, for and , we have
Thus, in Step 13,
which results in the following in Step 19:
Consequently, in Step 22, the condition is equivalent to
Since and are at most bits, and are at most bits, and the security parameter satisfies and , Equations (A5) and (A6) are
which means that lies in the bucket . Then, Step 23 decrypts the entry in each row of this bucket:
Thus, the condition in Step 25 is which means that . At this point, we record the ciphertexts of the and the signature in Step 26:
Consequently, in Step 30,
with and, in the last step (Step 31),
□
Appendix B.5. The Proof of Lemma 7
Proof.
Given the correctness established by Lemmas 3–5 for Algorithms 2–4, it follows that in Step 4, the two-tuple represents the encrypted nearest-neighbor point to Q. Due to the homomorphic property of Paillier’s cryptosystem, after Steps 5–7, , and is the nearest neighbor to Q. Also, by Lemma 6 and the homomorphic property, after Steps 8–11, we have and
Thus, after the unpacking operation in Step 12,
Through a similar analysis, we can also prove the cases for . □
References
- Wang, J.; Chen, X. Efficient and Secure Storage for Outsourced Data: A Survey; Springer: Berlin/Heidelberg, Germany, 2016; Volume 1, pp. 178–188. [Google Scholar] [CrossRef]
- Lei, X.; Liu, A.X.; Li, R.; Tu, G.H. SecEQP: A Secure and Efficient Scheme for SkNN Query Problem Over Encrypted Geodata on Cloud. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering (ICDE), Macao, China, 8–11 April 2019; pp. 662–673. [Google Scholar] [CrossRef]
- Liu, Q.; Hao, Z.; Peng, Y.; Jiang, H.; Wu, J.; Peng, T.; Wang, G.; Zhang, S. SecVKQ: Secure and verifiable kNN queries in sensor–cloud systems. J. Syst. Archit. 2021, 120, 102300. [Google Scholar] [CrossRef]
- Zhang, Y.; Wang, B.; Zhao, Z. Secure k-NN Query With Multiple Keys Based on Random Projection Forests. IEEE Internet Things J. 2024, 11, 15205–15218. [Google Scholar] [CrossRef]
- Qi, J.; Jia, X.; Luo, M.; Feng, Q. A Privacy-Aware K-Nearest Neighbor Query Scheme for Location-Based Services. IEEE Internet Things J. 2024, 11, 10831–10842. [Google Scholar] [CrossRef]
- Cheng, K.; Wang, L.; Shen, Y.; Wang, H.; Wang, Y.; Jiang, X.; Zhong, H. Secure k-NN Query on Encrypted Cloud Data with Multiple Keys. IEEE Trans. Big Data 2021, 7, 689–702. [Google Scholar] [CrossRef]
- Sundarapandi, G.P.; Bokhary, S.; Samanthula, B.K.; Dong, B. A Probabilistic Approach for Secure and Verifiable Computation of kNN Queries in Cloud. In Proceedings of the 2023 IEEE Cloud Summit, Baltimore, MD, USA, 6–7 July 2023; pp. 15–20. [Google Scholar] [CrossRef]
- Cui, N.; Qian, K.; Cai, T.; Li, J.; Yang, X.; Cui, J.; Zhong, H. Towards Multi-User, Secure, and Verifiable kNN Query in Cloud Database. IEEE Trans. Knowl. Data Eng. 2023, 35, 9333–9349. [Google Scholar] [CrossRef]
- Cui, N.; Yang, X.; Wang, B.; Li, J.; Wang, G. SVkNN: Efficient Secure and Verifiable k-Nearest Neighbor Query on the Cloud Platform. In Proceedings of the 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA, 20–24 April 2020; pp. 253–264. [Google Scholar] [CrossRef]
- Oliveira, S.R.; Zaiane, O.R. Privacy preserving clustering by data transformation. J. Inf. Data Manag. 2010, 1, 37. [Google Scholar]
- Wong, W.K.; Cheung, D.W.l.; Kao, B.; Mamoulis, N. Secure kNN computation on encrypted databases. In Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data, New York, NY, USA, 29 June–2 July 2009; SIGMOD ’09. pp. 139–152. [Google Scholar] [CrossRef]
- Hu, H.; Xu, J.; Ren, C.; Choi, B. Processing private queries over untrusted data cloud through privacy homomorphism. In Proceedings of the 2011 IEEE 27th International Conference on Data Engineering, Hannover, Germany, 11–16 April 2011; pp. 601–612. [Google Scholar] [CrossRef]
- Yao, B.; Li, F.; Xiao, X. Secure nearest neighbor revisited. In Proceedings of the 2013 IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, QLD, Australia, 8–12 April 2013; pp. 733–744. [Google Scholar] [CrossRef]
- Choi, S.; Ghinita, G.; Lim, H.S.; Bertino, E. Secure kNN Query Processing in Untrusted Cloud Environments. IEEE Trans. Knowl. Data Eng. 2014, 26, 2818–2831. [Google Scholar] [CrossRef]
- Wang, B.; Hou, Y.; Li, M. QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data. IEEE Trans. Cloud Comput. 2022, 10, 2066–2078. [Google Scholar] [CrossRef]
- Popa, R.A.; Li, F.H.; Zeldovich, N. An Ideal-Security Protocol for Order-Preserving Encoding. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 19–22 May 2013; pp. 463–477. [Google Scholar] [CrossRef]
- Zhu, Y.; Xu, R.; Takagi, T. Secure k-NN computation on encrypted cloud data without sharing key with query users. In Proceedings of the 2013 International Workshop on Security in Cloud Computing, Hangzhou, China, 8 May 2013; Cloud Computing ’13. pp. 55–60. [Google Scholar] [CrossRef]
- Zhu, Y.; Huang, Z.; Takagi, T. Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distrib. Comput. 2016, 89, 1–12. [Google Scholar] [CrossRef]
- Lei, X.; Tu, G.H.; Liu, A.X.; Xie, T. Fast and Secure kNN Query Processing in Cloud Computing. In Proceedings of the 2020 IEEE Conference on Communications and Network Security (CNS), Avignon, France, 29 June–1 July 2020; pp. 1–9. [Google Scholar] [CrossRef]
- Li, R.; Liu, A.X.; Xu, H.; Liu, Y.; Yuan, H. Adaptive Secure Nearest Neighbor Query Processing Over Encrypted Data. IEEE Trans. Dependable Secur. Comput. 2022, 19, 91–106. [Google Scholar] [CrossRef]
- Zheng, Y.; Lu, R.; Zhang, S.; Shao, J.; Zhu, H. Achieving Practical and Privacy-Preserving kNN Query over Encrypted Data. In IEEE Transactions on Dependable and Secure Computing; IEEE: Piscataway, NJ, USA, 2024; pp. 1–13. [Google Scholar] [CrossRef]
- Elmehdwi, Y.; Samanthula, B.K.; Jiang, W. Secure k-nearest neighbor query over encrypted data in outsourced environments. In Proceedings of the 2014 IEEE 30th International Conference on Data Engineering, Chicago, IL, USA, 31 March–4 April 2014; pp. 664–675. [Google Scholar] [CrossRef]
- Guan, Y.; Lu, R.; Zheng, Y.; Shao, J.; Wei, G. Toward Oblivious Location-Based k-Nearest Neighbor Query in Smart Cities. IEEE Internet Things J. 2021, 8, 14219–14231. [Google Scholar] [CrossRef]
- Yiu, M.L.; Lo, E.; Yung, D. Authentication of moving kNN queries. In Proceedings of the 2011 IEEE 27th International Conference on Data Engineering, Hannover, Germany, 11–16 April 2011; pp. 565–576. [Google Scholar] [CrossRef]
- Rong, H.; Wang, H.; Liu, J.; Wu, W.; Xian, M. Efficient Integrity Verification of Secure Outsourced kNN Computation in Cloud Environments. In Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23–26 August 2016; pp. 236–243. [Google Scholar] [CrossRef]
- Jiang, S.; Zhu, X.; Guo, L.; Liu, J. Publicly Verifiable Boolean Query Over Outsourced Encrypted Data. IEEE Trans. Cloud Comput. 2019, 7, 799–813. [Google Scholar] [CrossRef]
- Wu, S.; Li, Q.; Li, G.; Yuan, D.; Yuan, X.; Wang, C. ServeDB: Secure, Verifiable, and Efficient Range Queries on Outsourced Database. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering (ICDE), Macao, China, 8–11 April 2019; pp. 626–637. [Google Scholar] [CrossRef]
- Liu, X.; Deng, R.H.; Choo, K.K.R.; Weng, J. An Efficient Privacy-Preserving Outsourced Calculation Toolkit With Multiple Keys. IEEE Trans. Inf. Forensics Secur. 2016, 11, 2401–2414. [Google Scholar] [CrossRef]
- Yi, X.; Paulet, R.; Bertino, E.; Varadharajan, V. Practical Approximate k Nearest Neighbor Queries with Location and Query Privacy. IEEE Trans. Knowl. Data Eng. 2016, 28, 1546–1559. [Google Scholar] [CrossRef]
- Benabbas, S.; Gennaro, R.; Vahlis, Y. Verifiable Delegation of Computation over Large Datasets. In Proceedings of the Advances in Cryptology—CRYPTO 2011, Santa Barbara, CA, USA, 14–18 August 2011; Rogaway, P., Ed.; Springer: Berlin/Heidelberg, Germany, 2011; pp. 111–131. [Google Scholar]
- Gennaro, R.; Gentry, C.; Parno, B. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers. In Proceedings of the Advances in Cryptology—CRYPTO 2010, Santa Barbara, CA, USA, 15–19 August 2010; Rabin, T., Ed.; Springer: Berlin/Heidelberg, Germany, 2010; pp. 465–482. [Google Scholar]
- Parno, B.; Raykova, M.; Vaikuntanathan, V. How to delegate and verify in public: Verifiable computation from attribute-based encryption. In Proceedings of the 9th International Conference on Theory of Cryptography, Sicily, Italy, 19–21 March 2012; Springer: Berlin/Heidelberg, Germany, 2012. TCC’12. pp. 422–439. [Google Scholar] [CrossRef]
- Wang, Q.; Zhou, F.; Zhou, B.; Xu, J.; Chen, C.; Wang, Q. Privacy-Preserving Publicly Verifiable Databases. IEEE Trans. Dependable Secur. Comput. 2022, 19, 1639–1654. [Google Scholar] [CrossRef]
- Liu, J.; Zhang, L.F. Privacy-Preserving and Publicly Verifiable Matrix Multiplication. IEEE Trans. Serv. Comput. 2023, 16, 2059–2071. [Google Scholar] [CrossRef]
- Paillier, P. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology—EUROCRYPT ’99; Stern, J., Ed.; Springer: Berlin/Heidelberg, Germany, 1999; pp. 223–238. [Google Scholar]
- National Institute of Standards and Technology. FIPS-186–3 FIPS 186-3, Digital Signature Standard (DSS)-NIST CSRC. Available online: https://csrc.nist.gov/files/pubs/fips/186-3/final/docs/fips_186-3.pdf (accessed on 10 April 2025).
- Okabe, A.; Boots, B.; Sugihara, K. Spatial Tessellations: Concepts and Applications of Voronoi Diagrams; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 1992. [Google Scholar]
- Kolahdouzan, M.; Shahabi, C. Voronoi-based K nearest neighbor search for spatial network databases. In Proceedings of the Thirtieth International Conference on Very Large Data Bases-Volume 30. VLDB Endowment, 2004, VLDB ’04, Toronto, ON, Canada, 30 August–3 September 2004; pp. 840–851. [Google Scholar]
- Liu, A.; Zhengy, K.; Liz, L.; Liu, G.; Zhao, L.; Zhou, X. Efficient secure similarity computation on encrypted trajectory data. In Proceedings of the 2015 IEEE 31st International Conference on Data Engineering, Seoul, Republic of Korea, 13–17 April 2015; pp. 66–77. [Google Scholar] [CrossRef]
- Liu, J.; Yang, J.; Xiong, L.; Pei, J. Secure Skyline Queries on Cloud Platform. In Proceedings of the 2017 IEEE 33rd International Conference on Data Engineering (ICDE), San Diego, CA, USA, 19–22 April 2017; pp. 633–644. [Google Scholar] [CrossRef]
- Yao, A.C.C. How to generate and exchange secrets. In Proceedings of the 27th Annual Symposium on Foundations of Computer Science (focs 1986), Toronto, ON, Canada, 27–29 October 1986; pp. 162–167. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).