Login / Signup

Verifiable Set Operations over Outsourced Databases.

Ran CanettiOmer PanethDimitrios PapadopoulosNikos Triandopoulos
Published in: Public Key Cryptography (2014)
Keyphrases
  • outsourced databases
  • third party
  • service providers
  • sufficient conditions
  • secret sharing
  • data sets
  • real world
  • privacy issues
  • privacy preserving data mining