Closed bamthomas closed 2 years ago
Implement protocol 12 from section 5.2 in the paper.
Querier is retrieving the PH response. She decrypts the hashes contained in the response and compute the intersection with hashes published by the document owner.
Implement protocol 12 from section 5.2 in the paper.
Querier is retrieving the PH response. She decrypts the hashes contained in the response and compute the intersection with hashes published by the document owner.