Login / Signup
Asymmetric Leaky Private Information Retrieval.
Islam Samy
Mohamed Adel Attia
Ravi Tandon
Loukas Lazos
Published in:
CoRR (2020)
Keyphrases
</>
private information retrieval
database
cryptographic protocols
peer to peer
privacy preserving
data sets
databases
user privacy