“…Then she sends the encryptions to the miner.For example, suppose there are three respondents 1, 2, and 3, having data ðM; 23; strokeÞðF; 24; fluÞðM; 23; allergyÞ, respectively, where the first two fields of each piece of data are the quasi-identifier. After proper encoding, respondent 1's data becomes (123, 55), respondent 2's data becomes (224, 38), and respondent 3's data becomes (123,49), where the quasi-identifiers are 123, 224, and 123, respectively. Then the miner receives an encryption of 123 and an encryption of 55 from respondent 1; the public key used to encrypt them is the product of the miner's public key and the DCH's public key.…”