“…In order to meet these objectives, TA1 performers used novel cryptographic techniques that enabled queries to be executed directly on an encrypted copy of the database held by a third party [2,9]. A variety of query types were supported, including equality, range, keyword, stem, string wildcards and substrings, ranking, and XML queries, as well as boolean combinations of the above types (and, or, and threshold).…”