Login / Signup

Secure Search on Encrypted Data via Multi-Ring Sketch.

Adi AkaviaDan FeldmanHayim Shaul
Published in: CCS (2018)
Keyphrases
  • sensitive data
  • encryption scheme
  • database
  • database systems
  • data mining
  • database applications
  • third party
  • security requirements
  • security analysis
  • homomorphic encryption