How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption.
Koji NuidaPublished in: APKC@AsiaCCS (2022)
Keyphrases
- homomorphic encryption
- privacy preserving
- data sharing
- encryption scheme
- query language
- query processing
- public key
- range queries
- data access
- secure multi party computation
- privacy preserving data mining
- multi party
- databases
- database
- information sharing
- data integration
- relational database systems
- data privacy
- low cost