Login / Signup
Obfuscation and Outsourced Computation with Certified Deletion.
James Bartusek
Sanjam Garg
Vipul Goyal
Dakshita Khurana
Giulio Malavolta
Justin Raizes
Bhaskar Roberts
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
third party
reverse engineering
service providers
database
neural network
privacy preserving
control flow
data transformation
efficiently computing