Login / Signup
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
Qingji Zheng
Shouhuai Xu
Published in:
IC2E (2015)
Keyphrases
</>
set intersection
third party
encrypted data
constraint networks
service providers
data hiding
data storage
encryption scheme
global consistency
database
sensitive data
high dimensional