Login / Signup
Using Secret Sharing for Searching in Encrypted Data.
Richard Brinkman
Jeroen Doumen
Willem Jonker
Published in:
Secure Data Management (2004)
Keyphrases
</>
secret sharing
encryption scheme
secret sharing scheme
multi party
third party
sensitive data
database
image processing
secret key
data structure
data model
compression algorithm
data sharing
encryption algorithm