Login / Signup
How to Run Turing Machines on Encrypted Data.
Shafi Goldwasser
Yael Tauman Kalai
Raluca A. Popa
Vinod Vaikuntanathan
Nickolai Zeldovich
Published in:
CRYPTO (2) (2013)
Keyphrases
</>
turing machine
dynamic allocation
third party
sensitive data
encrypted data
databases
digital libraries
cost effective
encryption algorithm
information systems
metadata
lightweight
data storage
encryption scheme
read write