Login / Signup
Quantum private queries: security analysis.
Vittorio Giovannetti
Seth Lloyd
Lorenzo Maccone
Published in:
IEEE Trans. Inf. Theory (2010)
Keyphrases
</>
security analysis
query language
smart card
query processing
high security
public key
image encryption
security requirements
encryption scheme
security properties
authentication protocol
user authentication
database
encryption algorithm
authentication scheme
private information
data sources
high dimensional