An Efficient PIR Construction Using Trusted Hardware
From MaRDI portal
Publication:3540144
DOI10.1007/978-3-540-85886-7_5zbMATH Open1181.68140OpenAlexW1544001366MaRDI QIDQ3540144FDOQ3540144
Authors: Yanjiang Yang, Xuhua Ding, Robert H. Deng, Feng Bao
Publication date: 20 November 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85886-7_5
Recommendations
- Private information retrieval using trusted hardware
- Advances in Cryptology - CRYPTO 2003
- Private information retrieval with a trusted hardware unit -- revisited
- New Constructions for UC Secure Computation Using Tamper-Proof Hardware
- Coded circuit for trusted computing: towards dynamic integrity measurement
- A tight lower bound for restricted PIR protocols
- On key agreement protocols based on tamper-proof hardware
- Composable Security in the Tamper-Proof Hardware Model Under Minimal Complexity
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25)
Cites Work
Cited In (3)
This page was built for publication: An Efficient PIR Construction Using Trusted Hardware
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3540144)