Research Article

Efficient Privacy-Preserving Protocol for k-NN Search over Encrypted Data in Location-Based Service

Figure 10

Computational time for encrypting the circular shift matrix.