Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I would more love to read a paper on how they do it and how much information they leak through whatever indexes they form.


From the project page: http://eprint.iacr.org/2013/508.pdf

"Multi-Key Searchable Encryption - Raluca Ada Popa and Nickolai Zeldovich"


Thanks a ton!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: