Research Article

A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks

Table 3

Attack time per step.

Attack granularityGetRepresent (ms)Simplification (ms)GetRowIndex (ms)GetColIndex (ms)

10 × 105433
20 × 2020211828
30 × 3069637999
40 × 40128131172217
50 × 50321342424484
60 × 60788740842996
70 × 701708165313791613
80 × 803358330025352839
90 × 906086621043364685
100 × 100112291044569877317