Random-index PIR and applications
From MaRDI portal
Publication:2697885
DOI10.1007/978-3-030-90456-2_2OpenAlexW3212299222MaRDI QIDQ2697885
Sophia Yakoubov, Craig Gentry, Shai Halevi, Jesper Buus Nielsen, Bernardo Magri
Publication date: 13 April 2023
Full work available at URL: https://doi.org/10.1007/978-3-030-90456-2_2
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Information storage and retrieval of data (68P20)
Related Items (7)
PAPR: publicly auditable privacy revocation for anonymous credentials ⋮ Public randomness extraction with ephemeral roles and worst-case corruptions ⋮ Sublinear secure computation from new assumptions ⋮ SCALES. MPC with small clients and larger ephemeral servers ⋮ YOLO YOSO: fast and simple encryption and secret sharing in the YOSO model ⋮ Encryption to the future. A paradigm for sending secret messages to future (anonymous) committees ⋮ Random-index oblivious RAM
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Private information retrieval with sublinear online time
- Can a public blockchain keep a secret?
- Asynchronous Byzantine agreement with subquadratic communication
- YOSO: You only speak once. Secure MPC with stateless ephemeral roles
- Fluid MPC: secure multiparty computation with dynamic participants
- Batch codes and their applications
- On the Insertion Time of Cuckoo Hashing
- Theory of Cryptography
This page was built for publication: Random-index PIR and applications