Comment by sodality2
3 years ago
> With a proper implementation of PIR, the server still needs to scan through the entire encrypted dataset (this is unavoidable, otherwise its I/O patterns would leak information)
https://news.ycombinator.com/item?id=31669370 (not original poster)
No comments yet
Contribute on Hacker News ↗