Login / Signup
Card-Based Cryptographic Protocols for Three-Input Functions Using Private Operations.
Yoshifumi Manabe
Hibiki Ono
Published in:
IWOCA (2021)
Keyphrases
</>
cryptographic protocols
private information retrieval
low cost
privacy preserving
security properties
database
end to end