Ziyang Liu, Sivaramakrishnan Natarajan, et al.
VLDB
Suppose that you want to delegate the ability to process your data, without giving away access to it. We show that this separation is possible: we describe a "fully homomorphic" encryption scheme that keeps data private, but that allows a worker that does not have the secret decryption key to compute any (still encrypted) result of the data, even when the function of the data is very complex. In short, a third party can perform complicated processing of data without being able to see it. Among other things, this helps make cloud computing compatible with privacy. © 2010 ACM.
Ziyang Liu, Sivaramakrishnan Natarajan, et al.
VLDB
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Yao Qi, Raja Das, et al.
ISSTA 2009
Renu Tewari, Richard P. King, et al.
IS&T/SPIE Electronic Imaging 1996