Distributed Certified Information Access for Mobile Devices
暂无分享,去创建一个
[1] Yuval Ishai,et al. Protecting data privacy in private information retrieval schemes , 1998, STOC '98.
[2] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[3] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[4] Ivan Visconti,et al. Mercurial Commitments: Minimal Assumptions and Efficient Constructions , 2006, TCC.
[5] Moses D. Liskov. Updatable Zero-Knowledge Databases , 2005, ASIACRYPT.
[6] A. Maximov,et al. Fast computation of large distributions and its cryptographic applications , 2005 .
[7] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[8] Bimal Roy,et al. Progress in Cryptology —INDOCRYPT 2000 , 2002, Lecture Notes in Computer Science.
[9] Silvio Micali,et al. Zero-knowledge sets , 2003, 44th Annual IEEE Symposium on Foundations of Computer Science, 2003. Proceedings..
[10] Rafail Ostrovsky,et al. Public Key Encryption with Keyword Search , 2004, EUROCRYPT.
[11] Kaoru Kurosawa,et al. Oblivious keyword search , 2004, J. Complex..
[12] Palash Sarkar,et al. Symmetrically Private Information Retrieval (Extended Abstract) , 2000 .
[13] Ronald Cramer,et al. Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings , 2005, EUROCRYPT.
[14] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.