An Efficient PIR Construction Using Trusted Hardware
From MaRDI portal
Publication:3540144
Recommendations
- Private information retrieval using trusted hardware
- Advances in Cryptology - CRYPTO 2003
- Private information retrieval with a trusted hardware unit -- revisited
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Coded circuit for trusted computing: towards dynamic integrity measurement
- A tight lower bound for restricted PIR protocols
- On key agreement protocols based on tamper-proof hardware
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
Cites work
- scientific article; zbMATH DE number 5009195 (Why is no real title available?)
- scientific article; zbMATH DE number 1261806 (Why is no real title available?)
- scientific article; zbMATH DE number 1559545 (Why is no real title available?)
- scientific article; zbMATH DE number 1559546 (Why is no real title available?)
- scientific article; zbMATH DE number 1759771 (Why is no real title available?)
- Private information retrieval using trusted hardware
- Software protection and simulation on oblivious RAMs
Cited in
(3)
This page was built for publication: An Efficient PIR Construction Using Trusted Hardware
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3540144)