General constructions for information-theoretic private information retrieval
From MaRDI portal
(Redirected from Publication:2485285)
Recommendations
Cites work
- scientific article; zbMATH DE number 4179276 (Why is no real title available?)
- scientific article; zbMATH DE number 4213418 (Why is no real title available?)
- scientific article; zbMATH DE number 5604104 (Why is no real title available?)
- scientific article; zbMATH DE number 3763833 (Why is no real title available?)
- scientific article; zbMATH DE number 1261806 (Why is no real title available?)
- scientific article; zbMATH DE number 1302806 (Why is no real title available?)
- scientific article; zbMATH DE number 1304086 (Why is no real title available?)
- scientific article; zbMATH DE number 2019623 (Why is no real title available?)
- scientific article; zbMATH DE number 1512689 (Why is no real title available?)
- scientific article; zbMATH DE number 1559546 (Why is no real title available?)
- scientific article; zbMATH DE number 1754644 (Why is no real title available?)
- scientific article; zbMATH DE number 1775399 (Why is no real title available?)
- scientific article; zbMATH DE number 1418319 (Why is no real title available?)
- A Geometric Approach to Information-Theoretic Private Information Retrieval
- Automata, Languages and Programming
- Communication Complexity of Simultaneous Messages
- Exponential lower bound for 2-query locally decodable codes via a quantum argument
- How to share a secret
- Improved upper bounds on information-theoretic private information retrieval (extended abstract)
- Locally random reductions: Improvements and applications
- On secret sharing systems
- On the efficiency of local decoding procedures for error-correcting codes
- Reducing the servers' computation in private information retrieval: PIR with preprocessing
- Short locally testable codes and proofs
- Simultaneous messages vs. communication
- Some Applications of Coding Theory in Computational Complexity
- Theory of Cryptography
- Universal service-providers for private information retrieval
- Upper bound on the communication complexity of private information retrieval
Cited in
(43)- Improved user-private information retrieval via finite geometry
- Private Information Retrieval Over Gaussian MAC
- On the optimal communication complexity of error-correcting multi-server PIR
- PIR codes from combinatorial structures
- Reducing the servers' computation in private information retrieval: PIR with preprocessing
- Degeneracy bounds for private information retrieval protocols
- On quantum advantage in information theoretic single-server PIR
- One-way functions are essential for single-server private information retrieval
- Improved polynomial secret-sharing schemes
- Applied Cryptography and Network Security
- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
- Quadratic multiparty randomized encodings beyond honest majority and their applications
- scientific article; zbMATH DE number 1559545 (Why is no real title available?)
- scientific article; zbMATH DE number 1775399 (Why is no real title available?)
- Private information retrieval from coded databases with colluding servers
- Communication-efficient distributed oblivious transfer
- scientific article; zbMATH DE number 1754644 (Why is no real title available?)
- Private information retrieval schemes using cyclic codes
- Some results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocols
- A general private information retrieval scheme for MDS coded databases with colluding servers
- Протокол конфиденциального получения информации
- Information hiding using matroid theory
- Optimal configurations for peer-to-peer user-private information retrieval
- CNF-FSS and its applications
- OnionPIR: effective protection of sensitive metadata in online communication networks
- Private information retrieval with preprocessing based on the approximate GCD problem
- Verifiable multi-server private information retrieval
- Reed-Muller Codes
- Multi-value private information retrieval with colluding databases via trace functions
- A tight lower bound for restricted PIR protocols
- Robust information-theoretic private information retrieval
- Private information and the `Information function': A survey of possible uses
- How to correct errors in multi-server PIR
- Query-efficient locally decodable codes of subexponential length
- Iterative Constructions and Private Data Release
- The order of communication complexity of PIR-protocols
- Similarity Based Interactive Private Information Retrieval
- scientific article; zbMATH DE number 1952910 (Why is no real title available?)
- Private information retrieval with result verification for more servers
- Selling multiple secrets to a single buyer
- On locally decodable codes, self-correctable codes, and \(t\)-private PIR
- Improved upper bounds on information-theoretic private information retrieval (extended abstract)
- A Geometric Approach to Information-Theoretic Private Information Retrieval
This page was built for publication: General constructions for information-theoretic private information retrieval
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2485285)