Queries on Encrypted Data Library

Getting Started

To get started, first get acquainted with the implemented algorithm "Conjunctive, Subset, and Range Queries on Encrypted Data" by Dan Boneh and Brent Waters. For an overview, refer to these slides by Dan Boneh. Stay tuned for slides pertaining to the usuage of this library specifically.

To start using our library, refer to our library manual or our command line manual. For a snapshot of how to use the library, see our command line example and our developer example.