Private Information Retrieval Using Trusted Hardware
暂无分享,去创建一个
Robert H. Deng | Feng Bao | Xuhua Ding | Shuhong Wang | Xuhua Ding | Shuhong Wang | R. Deng | F. Bao
[1] Yuval Ishai,et al. Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing , 2004, Journal of Cryptology.
[2] Yuval Ishai,et al. Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[3] Kenneth E. Batcher,et al. Sorting networks and their applications , 1968, AFIPS Spring Joint Computing Conference.
[4] Ronald L. Rivest,et al. Introduction to Algorithms , 1990 .
[5] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[6] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[7] Larry Joel Goldstein,et al. On the Synthesis of Signal Switching Networks with Transient Blocking , 1967, IEEE Trans. Electron. Comput..
[8] William I. Gasarch,et al. A Survey on Private Information Retrieval (Column: Computational Complexity) , 2004, Bull. EATCS.
[9] Sean W. Smith,et al. Private Information Storage with Logarithm-Space Secure Hardware , 2004, International Information Security Workshops.
[10] Jacques Patarin. Luby-rackoff: 7 rounds are enough for 2n(1-ε) security , 2003 .
[11] Sean W. Smith,et al. Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.
[12] John Black,et al. Ciphers with Arbitrary Finite Domains , 2002, CT-RSA.
[13] William Gasarch. A Survey on Private Information Retrieval , 2004 .
[14] Sean W. Smith,et al. Practical server privacy with secure coprocessors , 2001, IBM Syst. J..
[15] Abraham Waksman,et al. A Permutation Network , 1968, JACM.
[16] Ronald L. Rivest,et al. Introduction to Algorithms, Second Edition , 2001 .
[17] Helger Lipmaa,et al. An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.
[18] Jacques Patarin,et al. Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security , 2003, CRYPTO.
[19] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[20] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[21] Michael Luby,et al. How to Construct Pseudo-Random Permutations from Pseudo-Random Functions (Abstract) , 1986, CRYPTO.
[22] Joan Feigenbaum,et al. Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him? , 1985, CRYPTO.