Protecting data privacy in private information retrieval schemes
From MaRDI portal
Publication:1577014
DOI10.1006/JCSS.1999.1689zbMATH Open0958.68059OpenAlexW2951483008MaRDI QIDQ1577014FDOQ1577014
Authors: Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
Publication date: 27 August 2000
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1006/jcss.1999.1689
Recommendations
Cites Work
- How to share a secret
- Oblivious transfers and intersecting codes
- Title not available (Why is that?)
- Oblivious transfer and polynomial evaluation
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Title not available (Why is that?)
- A Zero-One Law for Boolean Privacy
- Title not available (Why is that?)
- A minimal model for secure computation (extended abstract)
- Privacy and Communication Complexity
- Title not available (Why is that?)
- Title not available (Why is that?)
- Upper bound on the communication complexity of private information retrieval
- Title not available (Why is that?)
- Title not available (Why is that?)
- Improved upper bounds on information-theoretic private information retrieval (extended abstract)
- Title not available (Why is that?)
- Title not available (Why is that?)
- One-way functions are essential for single-server private information retrieval
Cited In (76)
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Relativistic quantum private database queries
- Quantum symmetrically-private information retrieval
- A novel quantum solution to secure two-party distance computation
- A new protocol for quantum private query against joint-measurement attack
- Semi-quantum private query protocol without invoking the measurement capability of classical user
- A novel tamper evident single database information-theoretic private information retrieval for user privacy applications
- Robust high capability QKD-based database private query
- Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol
- Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
- Multi-user quantum private query protocol
- Enhancing user privacy in SARG04-based private database query protocols
- Title not available (Why is that?)
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
- Towards breaking the exponential barrier for general secret sharing
- Practical quantum database private query protocol with classical database owner
- Oblivious signature-based envelope
- PRIVATE DATABASE QUERIES USING QUANTUM STATES WITH LIMITED COHERENCE TIMES
- Privacy-enhanced multi-user quantum private data query using partial quantum homomorphic encryption
- Cryptanalysis of multi-user quantum private query protocol
- Effective agent quantum private data query against malicious joint attack with blind quantum computing
- Quadratic secret sharing and conditional disclosure of secrets
- Title not available (Why is that?)
- Quantum private query with perfect user privacy against a joint-measurement attack
- Quantum private query based on Bell state and single photons
- Communication complexity of conditional disclosure of secrets and attribute-based encryption
- Measuring, simulating and exploiting the head concavity phenomenon in BKZ
- Title not available (Why is that?)
- Garbled circuits as randomized encodings of functions: a primer
- The communication complexity of private simultaneous messages, revisited
- Private information retrieval
- Quantum private query with authentication
- Quantum private query based on stable error correcting code in the case of noise
- Secret sharing schemes for dense forbidden graphs
- Private multiparty sampling and approximation of vector combinations
- Placing conditional disclosure of secrets in the communication complexity universe
- Title not available (Why is that?)
- Novel classical post-processing for quantum key distribution-based quantum private query
- Quantum private query based on single-photon interference
- Practical quantum private query based on Bell state
- Non-interactive anonymous router
- Guarding your searches: data protection at zbMATH
- Multi-user quantum private query
- Quantum Private Queries
- Practical two-way QKD-based quantum private query with better performance in user privacy
- Inner-product functional encryption with fine-grained access control
- Privacy-enhanced attribute-based private information retrieval
- Restricted adaptive oblivious transfer
- Nearest private query based on quantum oblivious key distribution
- Minimizing locality of one-way functions via semi-private randomized encodings
- Security improvements of several basic quantum private query protocols with \(O(\log N)\) communication complexity
- On Private Information Retrieval Supporting Range Queries
- Some open problems in information-theoretic cryptography
- Low-leakage secure search for Boolean expressions
- Optimal linear multiparty conditional disclosure of secrets protocols
- Robust quantum private queries
- From private simultaneous messages to zero-information Arthur-Merlin protocols and back
- From private simultaneous messages to zero-information Arthur-Merlin protocols and back
- Selling multiple secrets to a single buyer
- Private database queries using one quantum state
- Improved polynomial secret-sharing schemes
- Non-interactive anonymous router with quasi-linear router computation
- On the exact round complexity of secure three-party computation
- Title not available (Why is that?)
- Data curation from privacy-aware agents
- Private join and compute from PIR with default
- Протокол конфиденциального получения информации
- A theory of composition for differential obliviousness
- OnionPIR: effective protection of sensitive metadata in online communication networks
- Probabilistic versions of quantum private queries
- Quantum private query protocol based on counterfactual quantum key distribution with noiseless attack
- Siren: secure data sharing over P2P and F2F networks
- Analysis and protection to user privacy in quantum private query with non-ideal light source
- Succinct computational secret sharing
- Similarity Based Interactive Private Information Retrieval
This page was built for publication: Protecting data privacy in private information retrieval schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1577014)