Login / Signup
On the Asymptotic Capacity of X-Secure T-Private Information Retrieval With Graph-Based Replicated Storage.
Zhuqing Jia
Syed Ali Jafar
Published in:
IEEE Trans. Inf. Theory (2020)
Keyphrases
</>
cryptographic protocols
private information retrieval
user privacy
data replication
security protocols
lightweight
privacy preserving
authentication protocol
standard model
fault tolerant
file system
security issues
security mechanisms
key management
database
distributed databases
peer to peer