scientific article; zbMATH DE number 5009196
From MaRDI portal
Publication:3374904
zbMATH Open1082.68566MaRDI QIDQ3374904FDOQ3374904
Authors: Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky
Publication date: 1 March 2006
Title of this publication is not available (Why is that?)
Recommendations
- Information Security and Privacy
- Automata, Languages and Programming
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- Verifiable single-server private information retrieval
- A novel tamper evident single database information-theoretic private information retrieval for user privacy applications
- One-way functions are essential for single-server private information retrieval
- scientific article; zbMATH DE number 2090941
- Private information retrieval from coded databases with colluding servers
- A t-private k-database information retrieval scheme
- Single-server private information retrieval with sublinear amortized time
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25)
Cited In (29)
- Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
- Lower bounds for (batch) PIR with private preprocessing
- On the Security Loss in Cryptographic Reductions
- Another Look at Extended Private Information Retrieval Protocols
- Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol
- Combinatorially homomorphic encryption
- Near-optimal private information retrieval with preprocessing
- Providing accurate models across private partitioned data: secure maximum likelihood estimation
- One-way functions are essential for single-server private information retrieval
- A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- On basing private information retrieval on NP-hardness
- Programmable distributed point functions
- Private multiparty sampling and approximation of vector combinations
- Information hiding using matroid theory
- Improved and formal proposal for device-independent quantum private query *
- Private information retrieval with sublinear online time
- Homomorphic encryption
- Efficient and generic methods to achieve active security in private information retrieval and more advanced database search
- Efficient pre-processing PIR without public-key cryptography
- Lower-bounds on public-key operations in PIR
- Quantum oblivious transfer with relaxed constraints on the receiver
- PIR with client-side preprocessing: information-theoretic constructions and lower bounds
- Information Security and Privacy
- Privacy-enhanced attribute-based private information retrieval
- Protecting data privacy in private information retrieval schemes
- A proposal for device independent probabilistic quantum oblivious transfer
- Automata, Languages and Programming
- Flexible quantum oblivious transfer
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3374904)