Practical Keyword Private Information Retrieval from Key-to-Index Mappings
Meng Hao
34th USENIX Security Symposium (USENIX Security '25) · Day 2 · Crypto 2: Private Information Retrieval and Computation
Meng Hao
34th USENIX Security Symposium (USENIX Security '25) · Day 2 · Crypto 2: Private Information Retrieval and Computation