Oblivious Outsourced Storage with Delegation
暂无分享,去创建一个
Stefan Katzenbeisser | Peter Williams | Radu Sion | Andreas Peter | Bogdan Carbunar | Miroslava Sotáková | Martin Franz | S. Katzenbeisser | Andreas Peter | M. Franz | R. Sion | P. Williams | M. Sotáková | Bogdan Carbunar
[1] Dmitri Asonov. Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.
[2] Kenneth G. Paterson,et al. ID-based Signatures from Pairings on Elliptic Curves , 2002, IACR Cryptol. ePrint Arch..
[3] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[4] Abhi Shelat,et al. Simulatable Adaptive Oblivious Transfer , 2007, EUROCRYPT.
[5] Radu Sion,et al. On the Computational Practicality of Private Information Retrieval , 2006 .
[6] Sean W. Smith,et al. Private Information Storage with Logarithm-Space Secure Hardware , 2004, International Information Security Workshops.
[7] Shimshon Berkovits,et al. How To Broadcast A Secret , 1991, EUROCRYPT.
[8] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[9] Moni Naor. Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings , 2007, EUROCRYPT.
[10] Dennis Shasha,et al. Secure Untrusted Data Repository (SUNDR) , 2004, OSDI.
[11] Dieter Gollmann,et al. Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings , 2006, ESORICS.
[12] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[13] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[14] Adi Shamir,et al. The LSD Broadcast Encryption Scheme , 2002, CRYPTO.
[15] Peter Williams,et al. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage , 2008, CCS.
[16] Vitaly Shmatikov,et al. Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme , 2004, EUROCRYPT.
[17] Robert H. Deng,et al. Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..
[18] Moni Naor,et al. Revocation and Tracing Schemes for Stateless Receivers , 2001, CRYPTO.
[19] Douglas R. Stinson,et al. Advances in Cryptology — CRYPTO’ 93 , 2001, Lecture Notes in Computer Science.
[20] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[21] Dmitri Asonov,et al. Querying Databases Privately , 2004, Lecture Notes in Computer Science.
[22] William Gasarch. A Survey on Private Information Retrieval , 2004 .
[23] Aggelos Kiayias,et al. Traceable Signatures , 2004, EUROCRYPT.
[24] Stanislaw Jarecki,et al. Public Key Cryptography – PKC 2009 , 2009, Lecture Notes in Computer Science.
[25] Moti Yung,et al. Advances in Cryptology — CRYPTO 2002 , 2002, Lecture Notes in Computer Science.
[26] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..
[27] Donald W. Davies,et al. Advances in Cryptology — EUROCRYPT ’91 , 2001, Lecture Notes in Computer Science.
[28] Benny Pinkas,et al. Oblivious RAM Revisited , 2010, CRYPTO.