For example, d1 = < 2,1 > is encrypted as E(d1) = < E(2), E(1) > and the encrypted index is shown in Fig. 1. 3.2 Enhanced secure protocols Our kNN query processing algorithm is constructed using several secure protocols. We adopt four ...