메뉴 건너뛰기




Volumn , Issue , 2002, Pages 261-270

Breaking the O(n1/(2k-1)) barrier for information-theoretic private information retrieval

Author keywords

[No Author keywords available]

Indexed keywords

BINARY CODES; DATABASE SYSTEMS; DECODING; INFORMATION RETRIEVAL SYSTEMS; INFORMATION THEORY; NETWORK PROTOCOLS; PROBABILITY; SERVERS;

EID: 0036957230     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (227)

References (32)
  • 1
    • 84951063457 scopus 로고    scopus 로고
    • Upper bound on the communication complexity of private information retrieval
    • A. Ambainis. Upper bound on the communication complexity of private information retrieval. In 24th ICALP, LNCS 1256, pp. 401-407, 1997.
    • (1997) 24th ICALP, LNCS , vol.1256 , pp. 401-407
    • Ambainis, A.1
  • 2
    • 21844513803 scopus 로고
    • Simultaneous messages vs. communication
    • L. Babai, P. G. Kimmel, and S. V. Lokam. Simultaneous messages vs. communication. In STACS '95, LNCS 999, pp. 361-372, 1995.
    • (1995) STACS '95, LNCS , vol.999 , pp. 361-372
    • Babai, L.1    Kimmel, P.G.2    Lokam, S.V.3
  • 3
    • 33745511846 scopus 로고
    • Hiding instances in multioracle queries
    • vol. 415 of LNCS
    • D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In STACS '90, vol. 415 of LNCS, pp. 37-48, 1990.
    • (1990) STACS '90 , pp. 37-48
    • Beaver, D.1    Feigenbaum, J.2
  • 4
    • 0001870201 scopus 로고    scopus 로고
    • Locally random reductions: Improvements and applications
    • D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: Improvements and applications. J. of Cryptology, 10(1):17-36, 1997.
    • (1997) J. of Cryptology , vol.10 , Issue.1 , pp. 17-36
    • Beaver, D.1    Feigenbaum, J.2    Kilian, J.3    Rogaway, P.4
  • 5
    • 84879524288 scopus 로고    scopus 로고
    • Information-theoretic private information retrieval: A unified construction
    • vol. 2076 of LNCS
    • A. Beimel and Y. Ishai. Information-theoretic private information retrieval: A unified construction. In 28th ICALP, vol. 2076 of LNCS, pp. 912-926, 2001.
    • (2001) 28th ICALP , pp. 912-926
    • Beimel, A.1    Ishai, Y.2
  • 6
    • 84974593790 scopus 로고    scopus 로고
    • Reducing the servers' computation in private information retrieval: PIR with preprocessing
    • vol. 1880 of LNCS
    • A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers' computation in private information retrieval: PIR with preprocessing. In Crypto 2000, vol. 1880 of LNCS, pp. 56-74, 2000.
    • (2000) Crypto 2000 , pp. 56-74
    • Beimel, A.1    Ishai, Y.2    Malkin, T.3
  • 8
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • vol. 1592 of LNCS
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In Eurocrypt '99, vol. 1592 of LNCS, pp. 402-414, 1999.
    • (1999) Eurocrypt '99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 9
    • 0034782679 scopus 로고    scopus 로고
    • Selective private function evaluation with applications to private statistics
    • R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright. Selective private function evaluation with applications to private statistics. In 20th PODC, pp. 293 - 304, 2001.
    • (2001) 20th PODC , pp. 293-304
    • Canetti, R.1    Ishai, Y.2    Kumar, R.3    Reiter, M.K.4    Rubinfeld, R.5    Wright, R.N.6
  • 10
    • 0030645563 scopus 로고    scopus 로고
    • Computationally private information retrieval
    • B. Chor and N. Gilboa. Computationally private information retrieval. In 29th STOC, pp. 304-313, 1997.
    • (1997) 29th STOC , pp. 304-313
    • Chor, B.1    Gilboa, N.2
  • 13
    • 0012523350 scopus 로고    scopus 로고
    • Universal service-providers for private information retrieval
    • G. Di-Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. J. of Cryptology, 14(1):37-74, 2001.
    • (2001) J. of Cryptology , vol.14 , Issue.1 , pp. 37-74
    • Di-Crescenzo, G.1    Ishai, Y.2    Ostrovsky, R.3
  • 14
    • 80051636706 scopus 로고    scopus 로고
    • Single-database private information retrieval implies oblivious transfer
    • vol. 1807 of LNCS
    • G. Di-Crescenzo, T. Malkin, and R. Ostrovsky. Single-database private information retrieval implies oblivious transfer. In Eurocrypt 2000, vol. 1807, of LNCS, pp. 122-138, 2000.
    • (2000) Eurocrypt 2000 , pp. 122-138
    • Di-Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 16
    • 84937574654 scopus 로고    scopus 로고
    • A random server model for private information retrieval
    • vol. 1518 of LNCS
    • Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval. In Random '98, vol. 1518 of LNCS, pp. 200-217, 1998.
    • (1998) Random '98 , pp. 200-217
    • Gertner, Y.1    Goldwasser, S.2    Malkin, T.3
  • 17
    • 0034205020 scopus 로고    scopus 로고
    • Protecting data privacy in private information retrieval schemes
    • Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. JCSS, 60(3):592-629, 2000.
    • (2000) JCSS , vol.60 , Issue.3 , pp. 592-629
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 18
    • 0012609702 scopus 로고    scopus 로고
    • Personal communication
    • O. Goldreich. Personal communication, 2000.
    • (2000)
    • Goldreich, O.1
  • 19
    • 0036287480 scopus 로고    scopus 로고
    • Lower bounds for linear locally decodable codes and PIR
    • O. Goldreich, H. Karloff, L. Schulman, and L. Trevisan. Lower bounds for linear locally decodable codes and PIR. In 16th CCC, pp. 175 - 183, 2002.
    • (2002) 16th CCC , pp. 175-183
    • Goldreich, O.1    Karloff, H.2    Schulman, L.3    Trevisan, L.4
  • 20
    • 0032650474 scopus 로고    scopus 로고
    • Improved upper bounds on information theoretic private information retrieval
    • Y. Ishai and E. Kushilevitz. Improved upper bounds on information theoretic private information retrieval. 31st STOC, pp. 79 - 88, 1999.
    • (1999) 31st STOC , pp. 79-88
    • Ishai, Y.1    Kushilevitz, E.2
  • 22
    • 0035129748 scopus 로고    scopus 로고
    • On lower bounds for the communication complexity of private information retrieval
    • T. Itoh. On lower bounds for the communication complexity of private information retrieval. IEICE Trans. Fund. of Electronics, Commun. and Comp. Sci., E84-A(1):157-164, 2001.
    • (2001) IEICE Trans. Fund. of Electronics, Commun. and Comp. Sci. , vol.E84-A , Issue.1 , pp. 157-164
    • Itoh, T.1
  • 23
    • 0033720713 scopus 로고    scopus 로고
    • On the efficiency of local decoding procedures for error-correcting codes
    • J. Katz and L. Trevisan. On the efficiency of local decoding procedures for error-correcting codes. In 32nd STOC, pp. 80-86, 2000.
    • (2000) 32nd STOC , pp. 80-86
    • Katz, J.1    Trevisan, L.2
  • 24
    • 84879518622 scopus 로고    scopus 로고
    • Secure games with polynomial expressions
    • 2076 of LNCS
    • A. Kiayias and M. Yung. Secure games with polynomial expressions. In 28th ICALP, vol. 2076 of LNCS, pp. 939-950, 2001.
    • (2001) 28th ICALP , pp. 939-950
    • Kiayias, A.1    Yung, M.2
  • 25
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In 38th FOCS, pp. 364-373, 1997.
    • (1997) 38th FOCS , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 26
    • 84948954750 scopus 로고    scopus 로고
    • One-way trapdoor permutations are sufficient for single-database computationally-private information retrieval
    • E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for single-database computationally-private information retrieval. In Eurocrypt 2000, LNCS 1807, pp. 104-121, 2000.
    • (2000) Eurocrypt 2000, LNCS , vol.1807 , pp. 104-121
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 27
    • 0003625461 scopus 로고    scopus 로고
    • Private access to distributed information
    • Master's thesis, Technion
    • E. Mann. Private access to distributed information. Master's thesis, Technion, 1998.
    • (1998)
    • Mann, E.1
  • 28
    • 0034819509 scopus 로고    scopus 로고
    • Communication preserving protocols for secure function evaluation
    • M. Naor and K. Nissim. Communication preserving protocols for secure function evaluation. In 33th STOC, 2001.
    • (2001) 33th STOC
    • Naor, M.1    Nissim, K.2
  • 29
    • 0032669864 scopus 로고    scopus 로고
    • Oblivious transfer and polynomial evaluation
    • M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. In 31st STOC, pp. 245-254, 1999.
    • (1999) 31st STOC , pp. 245-254
    • Naor, M.1    Pinkas, B.2
  • 30
    • 0030714231 scopus 로고    scopus 로고
    • Private information storage
    • R. Ostrovsky and V. Shoup. Private information storage. In 29th STOC, pp. 294-303, 1997.
    • (1997) 29th STOC , pp. 294-303
    • Ostrovsky, R.1    Shoup, V.2
  • 31
    • 0012619663 scopus 로고    scopus 로고
    • Private information retrieval: Improved upper bound, extension and applications
    • Master's thesis, McGill University
    • J. F. Raymond. Private information retrieval: Improved upper bound, extension and applications. Master's thesis, McGill University, 2000.
    • (2000)
    • Raymond, J.F.1
  • 32
    • 84947772655 scopus 로고    scopus 로고
    • A new and efficient all-or-nothing disclosure of secrets protocol
    • vol. 1514 of LNCS
    • J. P. Stern. A new and efficient all-or-nothing disclosure of secrets protocol. In Asiacrypt '98, vol. 1514 of LNCS, pp. 357-371, 1998.
    • (1998) Asiacrypt '98 , pp. 357-371
    • Stern, J.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.