RAID-PIR: Practical Multi-Server PIR
暂无分享,去创建一个
[1] Ian Goldberg,et al. One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries , 2013, NDSS.
[2] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[3] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[4] Ian Goldberg,et al. Improving the Robustness of Private Information Retrieval , 2007 .
[5] Aggelos Kiayias,et al. Multi-query Computationally-Private Information Retrieval with Constant Communication Rate , 2010, Public Key Cryptography.
[6] Nick Mathewson,et al. The pynchon gate: a secure method of pseudonymous mail retrieval , 2005, WPES '05.
[7] Moni Naor,et al. Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..
[8] Yuval Ishai,et al. Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing , 2004, Journal of Cryptology.
[9] Ian Goldberg,et al. Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.
[10] Travis Mayberry,et al. Path-PIR: Lower Worst-Case Bounds by Combining ORAM and PIR , 2013, IACR Cryptol. ePrint Arch..
[11] George Danezis,et al. DP5: A Private Presence Service , 2015, Proc. Priv. Enhancing Technol..
[12] Robert H. Deng,et al. A new hardware-assisted PIR with O(n) shuffle cost , 2010, International Journal of Information Security.
[13] Robert H. Deng,et al. An Efficient PIR Construction Using Trusted Hardware , 2008, ISC.
[14] Vincenzo Conti,et al. A Self-Contained Biometric Sensor for Ubiquitous Authentication , 2007 .
[15] Philippe Gaborit,et al. A fast private information retrieval protocol , 2008, 2008 IEEE International Symposium on Information Theory.
[16] Reihaneh Safavi-Naini,et al. Verifiable Multi-server Private Information Retrieval , 2014, ACNS.
[17] Kouichi Sakurai,et al. Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving , 2007, The 2007 International Conference on Intelligent Pervasive Computing (IPC 2007).
[18] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[19] Randy H. Katz,et al. A case for redundant arrays of inexpensive disks (RAID) , 1988, SIGMOD '88.
[20] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[21] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[22] Radu Sion,et al. On the Practicality of Private Information Retrieval , 2007, NDSS.
[23] Justin Cappos,et al. Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates , 2013, Financial Cryptography.
[24] Elaine Shi,et al. Burst ORAM: Minimizing ORAM Response Times for Bursty Access Patterns , 2014, USENIX Security Symposium.
[25] Ian Goldberg,et al. The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency , 2014, Privacy Enhancing Technologies.
[26] Rafail Ostrovsky,et al. A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.
[27] Rafail Ostrovsky,et al. Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.
[28] Carmela Troncoso,et al. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval , 2011, USENIX Security Symposium.
[29] Ian Goldberg,et al. Optimally Robust Private Information Retrieval , 2012, USENIX Security Symposium.
[30] Travis Mayberry,et al. PIRMAP: Efficient Private Information Retrieval for MapReduce , 2013, Financial Cryptography.
[31] Rafail Ostrovsky,et al. Single Database Private Information Retrieval Implies Oblivious Transfer , 2000, EUROCRYPT.