Private information storage (extended abstract)
暂无分享,去创建一个
[1] Martín Abadi,et al. On hiding information from an oracle , 1987, J. Comput. Syst. Sci..
[2] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[3] Andris Ambainis,et al. On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .
[4] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[5] Adi Shamir,et al. How to share a secret , 1979, CACM.
[6] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[7] Silvio Micali,et al. Fair Public-Key Cryptosystems , 1992, CRYPTO.
[8] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[9] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[10] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[11] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[12] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[13] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.
[14] Avi Wigderson,et al. Multi-prover interactive proofs: how to remove intractability assumptions , 2019, STOC '88.
[15] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[16] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[17] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[18] Nabil R. Adam,et al. Security-control methods for statistical databases: a comparative study , 1989, CSUR.
[19] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[20] Andrew Chi-Chih Yao,et al. Theory and Applications of Trapdoor Functions (Extended Abstract) , 1982, FOCS.