Abstract | ||
---|---|---|
In this chapter we turn our attention to the second main subject of the book, namely, private information retrieval. Recall
that private information retrieval schemes are cryptographic protocols designed to safeguard the privacy of database users
by allowing clients to retrieve records from replicated databases while completely hiding the identity of the retrieved records
from the database owners.
|
Year | DOI | Venue |
---|---|---|
2010 | 10.1007/978-3-642-14358-8_4 | Commun. ACM |
DocType | Volume | Issue |
Journal | 53 | 4 |
Citations | PageRank | References |
1 | 0.38 | 0 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
Sergey Yekhanin | 1 | 983 | 52.33 |