upvote
But you leak all type of information and and the retrieve either leak even more data or you'll end up with transferring a god knows amount of data or your encryption is trivially broken or spend days/month/years to unencrypt.
reply
I don't know how you got these ideas but when you crack it, do make sure to write a post about it. Can't wait for that writeup.
reply
LWE estimator isn't a proxy for this?
reply
Math literacy needs to become standard for computer scientists. These takes are so bad
reply
Or reading papers on the subjects, and playing with implementing FHE search.
reply