Malicious Security for PIR (almost) for Free.
Brett Hemenway FalkPratyush MishraMatan ShtepelPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- malicious users
- access control
- intrusion detection
- malicious attacks
- information security
- network security
- security issues
- computer security
- insider attacks
- security policies
- information assurance
- security threats
- private information retrieval
- database
- cryptographic protocols
- security systems
- functional requirements
- security requirements
- network management
- statistical databases
- java card
- security protocols
- personal data
- malicious nodes
- malicious activities
- malicious traffic