A brief introduction to “Computing Over Encrypted Data”

Comentarios