Login / Signup

On the Capacity of Leaky Private Information Retrieval.

Islam SamyRavi TandonLoukas Lazos
Published in: ISIT (2019)
Keyphrases
  • private information retrieval
  • cryptographic protocols
  • peer to peer
  • privacy preserving
  • database
  • multimedia