메뉴 건너뛰기




Volumn 45, Issue 6, 1998, Pages 965-982

Private information retrieval

Author keywords

[No Author keywords available]

Indexed keywords

PRIVATE INFORMATION RETRIEVAL;

EID: 0032201622     PISSN: 00045411     EISSN: None     Source Type: Journal    
DOI: 10.1145/293347.293350     Document Type: Article
Times cited : (1206)

References (27)
  • 2
    • 0024914229 scopus 로고
    • Security-control methods for statistical databases: A comparative study
    • Dec.
    • ADAM, N., AND WORTMANN, J. 1989. Security-control methods for statistical databases: A comparative study. ACM Comput. Surv. 21, 4 (Dec.), 515-556.
    • (1989) ACM Comput. Surv. , vol.21 , Issue.4 , pp. 515-556
    • Adam, N.1    Wortmann, J.2
  • 3
    • 84951063457 scopus 로고    scopus 로고
    • An upper bound on the communication complexity of private information retrieval
    • Proceedings of the 24th ICALP Springer-Verlag, New York
    • AMBAINIS, A. 1997. An upper bound on the communication complexity of private information retrieval. In Proceedings of the 24th ICALP. Lecture Notes in Computer Science, vol. 1256. Springer-Verlag, New York, pp. 401-407.
    • (1997) Lecture Notes in Computer Science , vol.1256 , pp. 401-407
    • Ambainis, A.1
  • 4
    • 21844513803 scopus 로고
    • Simultaneous messages vs. communication
    • Proceedings of the Symposium on Theoretical Aspects in Computer Science (STACS). Springer-Verlag, New York
    • BABAI, L., KIMMEL, P., AND LOKAM, S. V. 1995. Simultaneous messages vs. communication. In Proceedings of the Symposium on Theoretical Aspects in Computer Science (STACS). Lecture Notes in Computer Science. Springer-Verlag, New York, pp. 361-372.
    • (1995) Lecture Notes in Computer Science , pp. 361-372
    • Babai, L.1    Kimmel, P.2    Lokam, S.V.3
  • 5
    • 33745511846 scopus 로고
    • Hiding instances in multioracle queries
    • Proceedings of the STACS. Springer-Verlag, New York
    • BEAVER, D., AND FEIGENBAUM, J. 1990. Hiding instances in multioracle queries. In Proceedings of the STACS. Lecture Notes in Computer Science, vol. 415. Springer-Verlag, New York, pp. 37-48.
    • (1990) Lecture Notes in Computer Science , vol.415 , pp. 37-48
    • Beaver, D.1    Feigenbaum, J.2
  • 6
    • 84979502594 scopus 로고
    • Security with low communication overhead
    • Proceedings of CRYPTO'90. Springer-Verlag, New York
    • BEAVER, D., FEIGENBAUM, J., KILIAN, J., AND ROGAWAY, P. 1991. Security with low communication overhead. In Proceedings of CRYPTO'90. Lecture Notes in Computer Sciences, vol. 537. Springer-Verlag, New York, pp. 62-76.
    • (1991) Lecture Notes in Computer Sciences , vol.537 , pp. 62-76
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 7
    • 0001870201 scopus 로고    scopus 로고
    • Locally random reductions: Improvements and applications
    • BEAVER, D., FEIGENBAUM, J., KILIAN, J., AND ROGAWAY, P. 1997. Locally random reductions: Improvements and applications. J. Crypt. 10, 1, 17-36.
    • (1997) J. Crypt. , vol.10 , Issue.1 , pp. 17-36
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 9
    • 0022754707 scopus 로고
    • Security problems on inference control for SUM, MAX, and MIN queries
    • July
    • CHIN, F. 1986. Security problems on inference control for SUM, MAX, and MIN queries. J. ACM 33, 3 (July), 451-464.
    • (1986) J. ACM , vol.33 , Issue.3 , pp. 451-464
    • Chin, F.1
  • 14
    • 0018444418 scopus 로고
    • Secure databases: Protection against user influence
    • Mar.
    • DOBKIN, D., JONES, A. K., AND LIPTON, R. J. 1979. Secure databases: Protection against user influence. ACM Trans. Datab. Syst. 4, 1 (Mar.), 97-106.
    • (1979) ACM Trans. Datab. Syst. , vol.4 , Issue.1 , pp. 97-106
    • Dobkin, D.1    Jones, A.K.2    Lipton, R.J.3
  • 15
    • 26444491386 scopus 로고
    • On the power of two-local random reductions
    • FORTNOW, L., AND SZEGEDY, M. 1992. On the power of two-local random reductions. Inf. Proc. Lett. 44, 6, 303-306.
    • (1992) Inf. Proc. Lett. , vol.44 , Issue.6 , pp. 303-306
    • Fortnow, L.1    Szegedy, M.2
  • 18
    • 0030149547 scopus 로고    scopus 로고
    • Software protection and simulation on oblivious RAMs
    • May
    • GOLDREICH, O., AND OSTROVSKY, R. 1996. Software protection and simulation on oblivious RAMs. J. ACM 43, 3 (May), 431-473.
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 19
    • 0026121387 scopus 로고
    • Modified bounds for covering codes
    • HONKALA, I. S. 1991. Modified bounds for covering codes. IEEE Trans. Inf. Theory 37, 2, 351-365.
    • (1991) IEEE Trans. Inf. Theory , vol.37 , Issue.2 , pp. 351-365
    • Honkala, I.S.1
  • 20
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • KUSHILEVITZ, E., AND OSTROVSKY, R. 1997. Replication is not needed: Single database, computationally-private information retrieval. In Proceedings of the 38th Symposium on Foundations of Computer Science. IEEE Computer Society Press, Los Alamitos, Calif., pp. 364-373.
    • (1997) Proceedings of the 38th Symposium on Foundations of Computer Science , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 23
    • 0000362179 scopus 로고    scopus 로고
    • Boolean, circuits, tensor ranks, and communication complexity
    • PUDLÁK, P., RÖDL, V., AND SGALL, J. 1997. Boolean, circuits, tensor ranks, and communication complexity. SICOMP 26, 605-633.
    • (1997) SICOMP , vol.26 , pp. 605-633
    • Pudlák, P.1    Rödl, V.2    Sgall, J.3
  • 24
    • 84889202146 scopus 로고
    • Private communication, quoted in the Acknowledgment section of ABADI, ET AL. [1989]
    • RIVEST, R. L. 1989. Private communication, quoted in the Acknowledgment section of ABADI, ET AL. [1989].
    • (1989)
    • Rivest, R.L.1
  • 25
    • 0005301490 scopus 로고
    • On data banks and privacy homomorphisms
    • R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, eds. Academic Press, Orlando, Fla.
    • RIVEST, R. L., ADLEMAN, L., AND DERTOUZOS, M. L. 1978. On data banks and privacy homomorphisms. In Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton, eds. Academic Press, Orlando, Fla.
    • (1978) Foundations of Secure Computation
    • Rivest, R.L.1    Adleman, L.2    Dertouzos, M.L.3
  • 26
    • 0028393221 scopus 로고
    • A modified random perturbation method for database security
    • Mar.
    • TENDICK, P., AND MATLOFF, N. 1994. A modified random perturbation method for database security. ACM Trans. Datab. Syst. 19, 1 (Mar.), 47-63.
    • (1994) ACM Trans. Datab. Syst. , vol.19 , Issue.1 , pp. 47-63
    • Tendick, P.1    Matloff, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.