Protecting data privacy in private information retrieval schemes
From MaRDI portal
(Redirected from Publication:1577014)
Recommendations
Cites work
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- scientific article; zbMATH DE number 3856987 (Why is no real title available?)
- scientific article; zbMATH DE number 4213418 (Why is no real title available?)
- scientific article; zbMATH DE number 5009196 (Why is no real title available?)
- scientific article; zbMATH DE number 3960854 (Why is no real title available?)
- scientific article; zbMATH DE number 4012495 (Why is no real title available?)
- scientific article; zbMATH DE number 1261806 (Why is no real title available?)
- scientific article; zbMATH DE number 1304086 (Why is no real title available?)
- scientific article; zbMATH DE number 1559546 (Why is no real title available?)
- A Zero-One Law for Boolean Privacy
- A minimal model for secure computation (extended abstract)
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- How to share a secret
- Improved upper bounds on information-theoretic private information retrieval (extended abstract)
- Oblivious transfer and polynomial evaluation
- Oblivious transfers and intersecting codes
- One-way functions are essential for single-server private information retrieval
- Privacy and Communication Complexity
- Upper bound on the communication complexity of private information retrieval
Cited in
(76)- Data curation from privacy-aware agents
- OnionPIR: effective protection of sensitive metadata in online communication networks
- Private join and compute from PIR with default
- Analysis and protection to user privacy in quantum private query with non-ideal light source
- Succinct computational secret sharing
- Improved polynomial secret-sharing schemes
- Non-interactive anonymous router with quasi-linear router computation
- On the exact round complexity of secure three-party computation
- Similarity Based Interactive Private Information Retrieval
- scientific article; zbMATH DE number 2090942 (Why is no real title available?)
- Протокол конфиденциального получения информации
- Quantum private query protocol based on counterfactual quantum key distribution with noiseless attack
- Probabilistic versions of quantum private queries
- A theory of composition for differential obliviousness
- Siren: secure data sharing over P2P and F2F networks
- Measuring, simulating and exploiting the head concavity phenomenon in BKZ
- From private simultaneous messages to zero-information Arthur-Merlin protocols and back
- Multi-user quantum private query protocol
- Selling multiple secrets to a single buyer
- Private database queries using one quantum state
- Enhancing user privacy in SARG04-based private database query protocols
- Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol
- Nearest private query based on quantum oblivious key distribution
- Secret sharing schemes for dense forbidden graphs
- Placing conditional disclosure of secrets in the communication complexity universe
- On the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information rate
- Low-leakage secure search for Boolean expressions
- Conditional disclosure of secrets: amplification, closure, amortization, lower-bounds, and separations
- Private information retrieval
- A novel quantum solution to secure two-party distance computation
- Quantum private query with authentication
- Practical quantum private query based on Bell state
- Non-interactive anonymous router
- Quantum symmetrically-private information retrieval
- scientific article; zbMATH DE number 1775399 (Why is no real title available?)
- Practical two-way QKD-based quantum private query with better performance in user privacy
- Towards breaking the exponential barrier for general secret sharing
- Inner-product functional encryption with fine-grained access control
- Security improvements of several basic quantum private query protocols with \(O(\log N)\) communication complexity
- Quantum private query with perfect user privacy against a joint-measurement attack
- Quantum Private Queries
- Practical quantum database private query protocol with classical database owner
- Minimizing locality of one-way functions via semi-private randomized encodings
- scientific article; zbMATH DE number 1559546 (Why is no real title available?)
- Privacy-enhanced attribute-based private information retrieval
- scientific article; zbMATH DE number 1754646 (Why is no real title available?)
- Quantum private query based on Bell state and single photons
- Optimal linear multiparty conditional disclosure of secrets protocols
- Garbled circuits as randomized encodings of functions: a primer
- Oblivious signature-based envelope
- Quantum private query based on stable error correcting code in the case of noise
- PRIVATE DATABASE QUERIES USING QUANTUM STATES WITH LIMITED COHERENCE TIMES
- Privacy-enhanced multi-user quantum private data query using partial quantum homomorphic encryption
- Cryptanalysis of multi-user quantum private query protocol
- Effective agent quantum private data query against malicious joint attack with blind quantum computing
- Quadratic secret sharing and conditional disclosure of secrets
- On Private Information Retrieval Supporting Range Queries
- The communication complexity of private simultaneous messages, revisited
- New Communication-Efficient Oblivious Transfer Protocols Based on Pairings
- Robust quantum private queries
- Semi-quantum private query protocol without invoking the measurement capability of classical user
- A new protocol for quantum private query against joint-measurement attack
- Private multiparty sampling and approximation of vector combinations
- Guarding your searches: data protection at zbMATH
- Novel classical post-processing for quantum key distribution-based quantum private query
- A novel tamper evident single database information-theoretic private information retrieval for user privacy applications
- Quantum private query based on single-photon interference
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Robust high capability QKD-based database private query
- Restricted adaptive oblivious transfer
- Multi-user quantum private query
- Communication complexity of conditional disclosure of secrets and attribute-based encryption
- scientific article; zbMATH DE number 7559047 (Why is no real title available?)
- Relativistic quantum private database queries
- Some open problems in information-theoretic cryptography
- From private simultaneous messages to zero-information Arthur-Merlin protocols and back
This page was built for publication: Protecting data privacy in private information retrieval schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1577014)