Performing efficient comparison operations on encrypted data
Abstract:
In computer-implemented technology for comparing first and second values that are encrypted according to a fully homomorphic encryption scheme, the following function is computed: f ⁡ ( ɛ ⁡ ( x ) , ɛ ⁡ ( y ) ) = { ɛ ⁡ ( 0 ) ⁢ ⁢ … ⁢ ⁢ if ⁢ ⁢ … ⁢ ⁢ x ≠ y ɛ ⁡ ( 1 ) ⁢ ⁢ … ⁢ ⁢ ⁢ if ⁢ ⁢ … ⁢ ⁢ x = y } where ε(.) is a fully homomorphic encryption scheme.
Public/Granted literature
Information query
Patent Agency Ranking
0/0