Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols.
Douglas R. StinsonRuizhong WeiPublished in: J. Math. Cryptol. (2007)
Keyphrases
- private information retrieval
- cryptographic protocols
- database
- user privacy
- authentication protocol
- peer to peer
- response time
- query processing
- security protocols
- databases
- standard model
- private information
- data objects
- data sources
- lightweight
- data structure
- client server
- security analysis
- moving objects
- digital libraries
- database systems