Return to Article Details Optimizing Secure Cloud Computation: A Comparative Study of Fully Homomorphic Re-encryption Models for Encrypted Data Evaluation Download Download PDF