no code implementations • 14 Mar 2017 • Benny Fuhry, Raad Bahmani, Ferdinand Brasser, Florian Hahn, Florian Kerschbaum, Ahmad-Reza Sadeghi
Software-based approaches for search over encrypted data are still either challenged by lack of proper, low-leakage encryption or slow performance.
Cryptography and Security