Cross Subspace Alignment and the Asymptotic Capacity of X-Secure T-Private Information Retrieval.
Zhuqing JiaHua SunSyed Ali JafarPublished in: CoRR (2018)
Keyphrases
- cryptographic protocols
- private information retrieval
- user privacy
- low dimensional
- high dimensional
- high dimensional data
- database
- feature space
- metadata
- principal component analysis
- security protocols
- databases
- formal verification
- authentication protocol
- security analysis
- security requirements
- security issues
- dimensionality reduction
- digital libraries
- sensitive data
- standard model
- privacy preserving
- lightweight
- peer to peer
- identity management