Using Linearly-Homomorphic Encryption to Evaluate Degree-2 Functions on Encrypted Data.
Dario CatalanoDario FiorePublished in: CCS (2015)
Keyphrases
- homomorphic encryption
- privacy preserving
- data sharing
- encrypted data
- encryption scheme
- third party
- public key
- encryption algorithm
- information sharing
- sensitive data
- privacy preserving data mining
- data access
- distributed data
- data hiding
- data privacy
- private information
- information systems
- security analysis
- ciphertext
- read write
- digital libraries