Evaluating 2-dnf formulas on ciphertexts,” (2005)

by D Boneh, E Goh, K Nissim
Venue:in Proceedings of Theory of Cryptography (TCC),