作者: Henry Corrigan-Gibbs , Dan Boneh , David Mazieres
DOI: 10.1109/SP.2015.27
关键词: Private information retrieval 、 Computer security 、 Internet privacy 、 Cryptography 、 The Internet 、 Denial-of-service attack 、 Electronic mail 、 Server 、 Computer science
摘要: … existence of an (s, t)-DPF with keys of length |k| (along with standard cryptographic assumptions) implies the existence of write-private database scheme using s servers that maintains …