Share Conversion and Private Information Retrieval
暂无分享,去创建一个
Yuval Ishai | Eyal Kushilevitz | Amos Beimel | Ilan Orlov | E. Kushilevitz | A. Beimel | Y. Ishai | I. Orlov
[1] Amnon Ta-Shma,et al. Local List Decoding with a Constant Number of Queries , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[2] R. J. McEliece,et al. On sharing secrets and Reed-Solomon codes , 1981, CACM.
[3] Klim Efremenko,et al. From irreducible representations to locally decodable codes , 2012, STOC '12.
[4] Tao Feng,et al. Query-Efficient Locally Decodable Codes of Subexponential Length , 2010, computational complexity.
[5] Yasuhiro Suzuki,et al. Improved Constructions for Query-Efficient Locally Decodable Codes of Subexponential Length , 2008, IEICE Trans. Inf. Syst..
[6] Vladimir Vapnik,et al. Chervonenkis: On the uniform convergence of relative frequencies of events to their probabilities , 1971 .
[7] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[8] Yuval Ishai,et al. Breaking the Barrier for Information-Theoretic Private Information Retrieval , 2002 .
[9] Avi Wigderson,et al. Linear Systems over Composite Moduli , 2009, 2009 50th Annual IEEE Symposium on Foundations of Computer Science.
[10] Sergey Yekhanin,et al. Towards 3-query locally decodable codes of subexponential length , 2008, JACM.
[11] Serge Fehr,et al. Span Programs over Rings and How to Share a Secret from a Module , 1998 .
[12] Ronald Cramer,et al. Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields , 2005, CRYPTO.
[13] E. Kushilevitz,et al. Barrier for Information-Theoretic Private Information Retrieval , 2002 .
[14] Vince Grolmusz,et al. Superpolynomial Size Set-systems with Restricted Intersections mod 6 and Explicit Ramsey Graphs , 2000, Comb..
[15] Yuval Ishai,et al. Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation , 2005, TCC.
[16] Ronald de Wolf,et al. Exponential lower bound for 2-query locally decodable codes via a quantum argument , 2002, STOC '03.
[17] Peter Frankl. Constructing Finite Sets With Given Intersections , 1983 .
[18] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[19] Jonathan Katz,et al. On the efficiency of local decoding procedures for error-correcting codes , 2000, STOC '00.
[20] Zeev Dvir,et al. Matching Vector Codes , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[21] Luca Trevisan,et al. Lower bounds for linear locally decodable codes and private information retrieval , 2002, Proceedings 17th IEEE Annual Conference on Computational Complexity.
[22] Rafail Ostrovsky,et al. Private Searching on Streaming Data , 2005, Journal of Cryptology.
[23] Adi Shamir,et al. How to share a secret , 1979, CACM.
[24] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[25] Leonid A. Levin,et al. Checking computations in polylogarithmic time , 1991, STOC '91.
[26] Yuval Ishai,et al. Efficient Multi-party Computation over Rings , 2003, EUROCRYPT.
[27] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[28] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[29] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[30] R. Cramer,et al. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups , 2002 .
[31] Yuval Ishai,et al. Share conversion , pseudorandom secret-sharing and applications to secure distributed computing , 2005 .
[32] Ron Steinfeld,et al. On Secure Multi-party Computation in Black-Box Groups , 2007, CRYPTO.
[33] Yuval Ishai,et al. General constructions for information-theoretic private information retrieval , 2005, J. Comput. Syst. Sci..
[34] Sergey Yekhanin,et al. Locally Decodable Codes , 2012, Found. Trends Theor. Comput. Sci..
[35] Klim Efremenko,et al. 3-Query Locally Decodable Codes of Subexponential Length , 2008 .
[36] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[37] Tamir Tassa,et al. Improved efficiency for revocation schemes via Newton interpolation , 2006, TSEC.