Introduction to Cryptography
Northwestern EECS 395/495-0-21 Fall 2011
Monday, November 21, 2011
Lecture 27
Private Information Retrieval
2 databases n bits from Alice, 4 databases n
1/2
bits, 1 database n
1/2
bits using quadratic residues
Gasarch
webpage
and
survey
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment