Login / Signup
Verifiable Delegated Set Intersection Operations on Outsourced Encrypted Data.
Qingji Zheng
Shouhuai Xu
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
set intersection
third party
encrypted data
encryption scheme
global consistency
sensitive data
constraint networks
constraint satisfaction
data storage
service providers
sql queries
relational databases
security analysis
encryption algorithm
read write
reversible data hiding