Skip to main content
. 2019 Dec 4;19:255. doi: 10.1186/s12911-019-0983-9

Fig. 2.

Fig. 2

Schematic of performing computaitons on encrypted data using homomorphic encryption