Encrypted image retrieval in multi-key settings based on edge computing
Aiming at the fact that the existing encrypted image retrieval schemes do not consider different keys to encrypt images,a multi-key encrypted image retrieval system based on edge computing (including basic scheme and enhanced scheme) based on local sensitive hashing,secure nearest neighbor and proxy...
Saved in:
Main Authors: | Yingying LI, Jianfeng MA, Yinbin MIAO |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2020-04-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2020086/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Key storage management scheme based on keyed hash tree with state
by: Xiangyu WANG, et al.
Published: (2018-05-01) -
Efficient chosen-ciphertext secure proxy re-encryption scheme
by: Wei-wei ZHANG, et al.
Published: (2013-07-01) -
Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application
by: Ruiqi LI, et al.
Published: (2021-03-01) -
Novel construction of forward-secure public-key encryption in the standard model
by: Yang LU, et al.
Published: (2014-02-01) -
Improved RLCE public key encryption scheme based on Polar codes
by: Zhe LI, et al.
Published: (2020-10-01)