scientific article; zbMATH DE number 1775399
From MaRDI portal
Publication:4542532
zbMATH Open1027.68593MaRDI QIDQ4542532FDOQ4542532
Authors: Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin
Publication date: 17 September 2002
Title of this publication is not available (Why is that?)
Recommendations
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25)
Cited In (38)
- Quantum symmetrically-private information retrieval
- Knowledge encryption and its applications to simulatable protocols with low round-complexity
- Decoy-state quantum private query protocol with two-way communication
- Another Look at Extended Private Information Retrieval Protocols
- A novel tamper evident single database information-theoretic private information retrieval for user privacy applications
- A simple primal-dual approximation algorithm for 2-edge-connected spanning subgraphs
- Data curation from privacy-aware agents
- Private join and compute from PIR with default
- Title not available (Why is that?)
- Title not available (Why is that?)
- Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA
- Communication-efficient distributed oblivious transfer
- Electronic jury voting protocols
- Title not available (Why is that?)
- Actively secure arithmetic computation and VOLE with constant computational overhead
- Протокол конфиденциального получения информации
- Function-private conditional disclosure of secrets and multi-evaluation threshold distributed point functions
- An efficient quantum private query protocol based on oracle and Grover iteration
- Title not available (Why is that?)
- Improved and formal proposal for device-independent quantum private query *
- OnionPIR: effective protection of sensitive metadata in online communication networks
- Verifiable single-server private information retrieval from LWE with binary errors
- Oblivious transfer is in MiniQCrypt
- Multiparty reusable non-interactive secure computation from LWE
- Guarding your searches: data protection at zbMATH
- Siren: secure data sharing over P2P and F2F networks
- Similarity Based Interactive Private Information Retrieval
- General constructions for information-theoretic private information retrieval
- Two-round maliciously secure computation with super-polynomial simulation
- A proposal for device independent probabilistic quantum oblivious transfer
- On Private Information Retrieval Supporting Range Queries
- Oblivious keyword search
- Simulatable adaptive oblivious transfer with statistical receiver's privacy
- Theory of Cryptography
- Optimal bounds for parity-oblivious random access codes
- Privacy preserving electronic data gathering
- Verification protocol for stable matching from conditional disclosure of secrets
- Adaptive oblivious transfer and generalization
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4542532)