Sciweavers

ACNS
2010
Springer
114views Cryptology» more  ACNS 2010»
13 years 8 months ago
Two New Efficient PIR-Writing Protocols
Assume that a client outsources his database to a remote storage-provider (the server), so that for privacy reasons, the client's database is encrypted by his secret key. Duri...
Helger Lipmaa, Bingsheng Zhang