Login / Signup
Provably-secure symmetric private information retrieval with quantum cryptography.
Wen Yu Kon
Charles Ci Wen Lim
Published in:
CoRR (2020)
Keyphrases
</>
provably secure
private information retrieval
public key cryptography
cryptographic protocols
standard model
key management
public key
security model
signature scheme
hash functions
database
diffie hellman
peer to peer
encryption scheme
security properties
security analysis
user privacy
information security