Login / Signup

Using Secret Sharing for Searching in Encrypted Data.

Richard BrinkmanJeroen DoumenWillem Jonker
Published in: Secure Data Management (2004)
Keyphrases
  • secret sharing
  • encryption scheme
  • secret sharing scheme
  • multi party
  • third party
  • sensitive data
  • database
  • image processing
  • secret key
  • data structure
  • data model
  • compression algorithm
  • data sharing
  • encryption algorithm