Research Article

A Privacy-Protection Model for Patients

Figure 1

The process of homomorphic encryption. The function operations and are equivalent.