Extended results on privacy against coalitions of users in user-private information retrieval protocols
DOI10.1007/S12095-015-0125-XzbMATH Open1341.68042OpenAlexW2140046536MaRDI QIDQ892503FDOQ892503
Authors: Colleen M. Swanson, D. R. Stinson
Publication date: 19 November 2015
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-015-0125-x
Recommendations
- Extended combinatorial constructions for peer-to-peer user-private information retrieval
- scientific article; zbMATH DE number 1559546
- The Capacity of Private Information Retrieval Under Arbitrary Collusion Patterns for Replicated Databases
- The Capacity of Robust Private Information Retrieval With Colluding Databases
- Optimal configurations for peer-to-peer user-private information retrieval
- The Capacity of Private Information Retrieval from Byzantine and Colluding Databases
- scientific article; zbMATH DE number 1754644
- scientific article; zbMATH DE number 1583948
- Toward the Capacity of Private Information Retrieval From Coded and Colluding Servers
Information storage and retrieval of data (68P20) Cryptography (94A60) Combinatorial aspects of block designs (05B05) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- The CRC handbook of combinatorial designs
- k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY
- Title not available (Why is that?)
- Extended combinatorial constructions for peer-to-peer user-private information retrieval
- Using social networks to distort users' profiles generated by web search engines
- Linear spaces and transversal designs: \(k\)-anonymous combinatorial configurations for anonymous database search notes
- Optimal configurations for peer-to-peer user-private information retrieval
Cited In (4)
- Extended combinatorial constructions for peer-to-peer user-private information retrieval
- Improved user-private information retrieval via finite geometry
- Optimal configurations for peer-to-peer user-private information retrieval
- Multi-value private information retrieval with colluding databases via trace functions
This page was built for publication: Extended results on privacy against coalitions of users in user-private information retrieval protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q892503)