A Geometric Approach to Information-Theoretic Private Information Retrieval
暂无分享,去创建一个
[1] J. V. Armitage,et al. Introduction to Number Theory , 1966 .
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Rudolf Lide,et al. Finite fields , 1983 .
[4] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[5] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[6] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[7] Yuval Ishai,et al. Improved upper bounds on information-theoretic private information retrieval , 1999, STOC 1999.
[8] Yuval Ishai,et al. Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing , 2000, CRYPTO.
[9] Yuval Ishai,et al. Information-Theoretic Private Information Retrieval: A Unified Construction , 2001, ICALP.
[10] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[11] Yuval Ishai,et al. Breaking the Barrier for Information-Theoretic Private Information Retrieval , 2002 .
[12] Lance Fortnow,et al. A Nearly Tight Bound for Private Information Retrieval Protocols , 2003, Electron. Colloquium Comput. Complex..
[13] Yuval Ishai,et al. General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..
[14] Ronald de Wolf,et al. Improved Lower Bounds for Locally Decodable Codes and Private Information Retrieval , 2004, ICALP.
[15] Joan Feigenbaum,et al. Locally random reductions: Improvements and applications , 1997, Journal of Cryptology.
[16] Amos Beimel,et al. Robust Information-Theoretic Private Information Retrieval , 2002, Journal of Cryptology.