November 2020
Intermediate to advanced
548 pages
25h 5m
English
Feng-Hao Liu
University of Maryland
College Park, Maryland
Contents
23.2.2 Homomorphic Encryption Schemes for Additions or Multiplications
23.2.3 Fully Homomorphic Encryption
In the era of the Internet, we have seen the emergence of scenarios where a user outsources data remotely on a third-party provider and can later request access or computation on the data as illustrated as Figure 23.1. Such scenarios are broadly known as cloud computing where the provider plays the role of the cloud and offers various services to the users. In addition to ...
Read now
Unlock full access