Login / Signup
On the Asymptotic Capacity of X-Secure T-Private Information Retrieval with Graph Based Replicated Storage.
Zhuqing Jia
Syed Ali Jafar
Published in:
CoRR (2019)
Keyphrases
</>
cryptographic protocols
private information retrieval
user privacy
data replication
data storage
standard model
lightweight
security protocols
databases
file system
fault tolerant
privacy preserving
peer to peer
security requirements
security mechanisms
client server
identity management
database