Cross Subspace Alignment and the Asymptotic Capacity of $X$ -Secure $T$ -Private Information Retrieval.
Zhuqing JiaHua SunSyed Ali JafarPublished in: IEEE Trans. Inf. Theory (2019)
Keyphrases
- cryptographic protocols
- private information retrieval
- user privacy
- low dimensional
- standard model
- high dimensional
- dimensionality reduction
- peer to peer
- high dimensional data
- privacy preserving
- security issues
- database
- security protocols
- authentication protocol
- personal information
- identity management
- mobile devices
- feature space