Sign in
A New Approach for Private Searches on Public-Key Encrypted Data.
Amar Siad
Published in:
Communications and Multimedia Security (2012)
Keyphrases
</>
homomorphic encryption
public key
privacy preserving
encryption scheme
security analysis
data sharing
secret key
encrypted data
signature scheme
information systems
rfid tags
low cost
peer to peer
third party
privacy protection
privacy preserving data mining