Preferences

sodality2 parent
> With a proper implementation of PIR, the server still needs to scan through the entire encrypted dataset (this is unavoidable, otherwise its I/O patterns would leak information)

https://www.hackerneue.com/item?id=31669370 (not original poster)


This item has no comments currently.