Research Article

Order-Revealing Encryption Scheme with Comparison Token for Cloud Computing

Figure 1

An example of Bloom filter, where is added in the set and does not belong to the set.