Login / Signup
Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions.
Koji Nuida
Goichiro Hanaoka
Takahiro Matsuda
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
underlying assumptions
homomorphic encryption
privacy preserving
tree structure
data sharing
index structure
conversational agents
web services
case study
user interface
prior knowledge
software engineering
b tree
encryption scheme