How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption.
Koji NuidaPublished in: IACR Cryptol. ePrint Arch. (2021)
Keyphrases
- homomorphic encryption
- privacy preserving
- data sharing
- encryption scheme
- public key
- query language
- query processing
- database
- data sources
- data integration
- privacy preserving data mining
- information sharing
- range queries
- data mining
- semi honest
- privacy protection
- statistical databases
- relational database systems
- data access