Login / Signup

On the Capacity of Private Information Retrieval from Coded, Colluding, and Adversarial Servers.

Lukas HolzbaurRagnar Freij-HollantiCamilla Hollanti
Published in: ITW (2019)
Keyphrases
  • private information retrieval
  • traffic intensity
  • database
  • cryptographic protocols
  • databases
  • video sequences
  • peer to peer