Can We Access a Database Both Locally and Privately?
暂无分享,去创建一个
[1] Aggelos Kiayias,et al. Secure Games with Polynomial Expressions , 2001, ICALP.
[2] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[3] Eric Miles,et al. Secure Obfuscation in a Weak Multilinear Map Model , 2016, TCC.
[4] Gil Segev,et al. Limits on the Power of Indistinguishability Obfuscation and Functional Encryption , 2015, 2015 IEEE 56th Annual Symposium on Foundations of Computer Science.
[5] Rafail Ostrovsky,et al. Batch codes and their applications , 2004, STOC '04.
[6] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[7] Moni Naor,et al. Oblivious Polynomial Evaluation , 2006, SIAM J. Comput..
[8] Rafail Ostrovsky,et al. Searchable symmetric encryption: Improved definitions and efficient constructions , 2011, J. Comput. Secur..
[9] Dan Boneh,et al. Finding smooth integers in short intervals using CRT decoding , 2000, STOC '00.
[10] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[11] Aggelos Kiayias,et al. Decoding of Interleaved Reed Solomon Codes over Noisy Data , 2003, ICALP.
[12] Moni Naor,et al. Number-theoretic constructions of efficient pseudo-random functions , 2004, JACM.
[13] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[14] Brent Waters,et al. How to use indistinguishability obfuscation: deniable encryption, and more , 2014, IACR Cryptol. ePrint Arch..
[15] Yuval Ishai,et al. Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing , 2000, CRYPTO.
[16] Daniel Augot,et al. A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem , 2003, EUROCRYPT.
[17] Yael Tauman Kalai,et al. Protecting Obfuscation against Algebraic Attacks , 2014, EUROCRYPT.
[18] Avi Wigderson,et al. On span programs , 1993, [1993] Proceedings of the Eigth Annual Structure in Complexity Theory Conference.
[19] Aggelos Kiayias,et al. Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice , 2004, ASIACRYPT.
[20] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[21] Peter Bro Miltersen,et al. On data structures and asymmetric communication complexity , 1994, STOC '95.
[22] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[23] Oded Goldreich,et al. A Note on Computational Indistinguishability , 1990, Inf. Process. Lett..
[24] Rafail Ostrovsky,et al. Public-Key Locally-Decodable Codes , 2008, CRYPTO.
[25] Ran Canetti,et al. Towards Doubly Efficient Private Information Retrieval , 2017, TCC.
[26] Jonathan Katz,et al. On the efficiency of local decoding procedures for error-correcting codes , 2000, STOC '00.
[27] Phillip Rogaway,et al. How to Encipher Messages on a Small Domain , 2009, CRYPTO.
[28] Madhu Sudan,et al. Reconstructing curves in three (and higher) dimensional space from noisy data , 2003, STOC '03.
[29] Or Meir,et al. High-rate locally-correctable and locally-testable codes with sub-polynomial query complexity , 2016, STOC.
[30] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[31] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[32] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[33] Jean-Sébastien Coron. Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem , 2004, Public Key Cryptography.
[34] Rafail Ostrovsky,et al. Cryptography from Anonymity , 2006, 2006 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS'06).
[35] Niv Gilboa,et al. Computationally private information retrieval (extended abstract) , 1997, STOC '97.
[36] Rafail Ostrovsky,et al. Private Locally Decodable Codes , 2007, ICALP.
[37] Phong Q. Nguyen,et al. Noisy Polynomial Interpolation and Noisy Chinese Remaindering , 2000, EUROCRYPT.
[38] V. Sidelnikov,et al. On insecurity of cryptosystems based on generalized Reed-Solomon codes , 1992 .
[39] Eyal Kushilevitz,et al. Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.