Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
暂无分享,去创建一个
[1] Yuval Ishai,et al. Breaking the Circuit Size Barrier for Secure Computation Under DDH , 2016, CRYPTO.
[2] F. Moore,et al. Polynomial Codes Over Certain Finite Fields , 2017 .
[3] Ian Goldberg,et al. One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries , 2013, NDSS.
[4] Nadia Heninger,et al. Approximate common divisors via lattices , 2011, IACR Cryptol. ePrint Arch..
[5] Frank Wang,et al. Splinter: Practical Private Queries on Public Data , 2017, NSDI.
[6] Ian Goldberg,et al. Improving the Robustness of Private Information Retrieval , 2007 .
[7] Ian Goldberg,et al. Privacy-Preserving Queries over Relational Databases , 2010, Privacy Enhancing Technologies.
[8] Yuval Ishai,et al. Function Secret Sharing: Improvements and Extensions , 2016, CCS.
[9] D. Cheriton,et al. Relational-Complete Private Information Retrieval , 2007 .
[10] Ian Goldberg,et al. Optimally Robust Private Information Retrieval , 2012, USENIX Security Symposium.
[11] Tuvi Etzion,et al. PIR Array Codes with Optimal PIR Rate , 2016, ArXiv.
[12] Ian Goldberg,et al. Making a Nymbler Nymble Using VERBS , 2010, Privacy Enhancing Technologies.
[13] Hirosuke Yamamoto,et al. Private information retrieval for coded storage , 2014, 2015 IEEE International Symposium on Information Theory (ISIT).
[14] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[15] Ryan Henry,et al. Polynomial Batch Codes for Efficient IT-PIR , 2016, Proc. Priv. Enhancing Technol..
[16] Vitaly Shmatikov,et al. Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.
[17] Adi Shamir,et al. How to share a secret , 1979, CACM.
[18] Tuvi Etzion,et al. PIR array codes with optimal PIR rates , 2016, 2017 IEEE International Symposium on Information Theory (ISIT).
[19] Tuvi Etzion,et al. PIR Array Codes With Optimal Virtual Server Rate , 2016, IEEE Transactions on Information Theory.
[20] Yuval Ishai,et al. Function Secret Sharing , 2015, EUROCRYPT.
[21] Paul Barrett,et al. Implementing the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor , 1986, CRYPTO.
[22] Nick Mathewson,et al. The pynchon gate: a secure method of pseudonymous mail retrieval , 2005, WPES '05.
[23] Eitan Yaakobi,et al. Codes for distributed PIR with low storage overhead , 2015, 2015 IEEE International Symposium on Information Theory (ISIT).