Login / Signup

Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.

Qingji ZhengShouhuai Xu
Published in: IC2E (2015)
Keyphrases
  • set intersection
  • third party
  • encrypted data
  • constraint networks
  • service providers
  • data hiding
  • data storage
  • encryption scheme
  • global consistency
  • database
  • sensitive data
  • high dimensional