-
1
-
-
84951063457
-
Upper bound on the communication complexity of private information retrieval
-
A. Ambainis. Upper bound on the communication complexity of private information retrieval. In Proc. of 24th ICALP, pages 401-407, 1997.
-
(1997)
Proc. of 24th ICALP
, pp. 401-407
-
-
Ambainis, A.1
-
2
-
-
0024940038
-
Non-cryptographic fault-tolerant computing in a constant number of rounds
-
J. Bar-Ilan and D. Beaver. Non-cryptographic fault-tolerant computing in a constant number of rounds. In Proc. of 8th PODC, pages 201-209, 1989.
-
(1989)
Proc. of 8th PODC
, pp. 201-209
-
-
Bar-Ilan, J.1
Beaver, D.2
-
3
-
-
33745511846
-
Hiding instances in multioracle queries
-
D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In Proc. of 6th STACS, pages 37-48, 1990.
-
(1990)
Proc. of 6th STACS
, pp. 37-48
-
-
Beaver, D.1
Feigenbaum, J.2
-
4
-
-
0002840876
-
Security with low communication overhead
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Proc. of CRYPTO '90, pages 62-76, 1990.
-
(1990)
Proc. of CRYPTO '90
, pp. 62-76
-
-
Beaver, D.1
Feigenbaum, J.2
Kilian, J.3
Rogaway, P.4
-
5
-
-
0025137207
-
The round complexity of secure protocols (extended abstract)
-
D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols (extended abstract). In Proc. of 22nd STOC, pages 503-513, 1990.
-
(1990)
Proc. of 22nd STOC
, pp. 503-513
-
-
Beaver, D.1
Micali, S.2
Rogaway, P.3
-
7
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for noncryptographic fault-tolerant distributed computation. In Proc. of 20th STOC, pages 1-10, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
8
-
-
0030645563
-
Computationally private information retrieval
-
B. Chor and N. Gilboa. Computationally private information retrieval. In Proc. of the 29th STOC, pages 304-313, 1997.
-
(1997)
Proc. of the 29th STOC
, pp. 304-313
-
-
Chor, B.1
Gilboa, N.2
-
9
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
C. Cachin, S. Micali, and M. Stadier. Computationally private information retrieval with polylogarithmic communication. In Proc. of EUROCRYPT '99, pages 402-414, 1999.
-
(1999)
Proc. of EUROCRYPT '99
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadier, M.3
-
10
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
D. Chaum, C. Crépeau, and I. Damgard. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988.
-
(1988)
Proc. of 20th STOC
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgard, I.3
-
11
-
-
0029541045
-
Private information retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th FOCS, pages 41-51, 1995.
-
(1995)
Proc. of the 36th FOCS
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
13
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
R. Cramer, I. Damgard, and U. Maurer. General secure multi-party computation from any linear secret-sharing scheme. In Proc. of EUROCRYPT 2000, pages 316-334, 2000.
-
(2000)
Proc. of EUROCRYPT 2000
, pp. 316-334
-
-
Cramer, R.1
Damgard, I.2
Maurer, U.3
-
14
-
-
0036287481
-
Better lower bounds for locally decodable codes
-
A. Deshpande, R. Jain, T Kavita, V. Lokam, and J. Radhakrishnan. Better lower bounds for locally decodable codes. In Proc. of 16th CCC, pages 184-193, 2002.
-
(2002)
Proc. of 16th CCC
, pp. 184-193
-
-
Deshpande, A.1
Jain, R.2
Kavita, T.3
Lokam, V.4
Radhakrishnan, J.5
-
15
-
-
80051636706
-
Single-database private information retrieval implies oblivious transfer
-
G. Di-Crescenzo, T. Malkin, and R. Ostrovsky. Single-database private information retrieval implies oblivious transfer. In Proc. of EUROCRYPT 2000, pages 122-138, 2000.
-
(2000)
Proc. of EUROCRYPT 2000
, pp. 122-138
-
-
Di-Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
16
-
-
0031624875
-
Protecting data privacy in private information retrieval schemes
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. of 30th STOC, pages 151-160, 1998.
-
(1998)
Proc. of 30th STOC
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
19
-
-
0036287480
-
Lower bounds for linear locally decodable codes and PIR
-
O. Goldreich, H. Karloff, L. Schulman, and L. Trevisan. Lower bounds for linear locally decodable codes and PIR. In Proc. of 16th CCC, pp. 175 - 183, 2002.
-
(2002)
Proc. of 16th CCC
, pp. 175-183
-
-
Goldreich, O.1
Karloff, H.2
Schulman, L.3
Trevisan, L.4
-
20
-
-
33745999816
-
Player Simulation and General Adversary Structures in Perfect Multiparty Computation
-
M. Hirt and U. Maurer. Player Simulation and General Adversary Structures in Perfect Multiparty Computation. In Journal of cryptology, 13(1), pages 31-60, 2000.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 31-60
-
-
Hirt, M.1
Maurer, U.2
-
21
-
-
0034507841
-
Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation
-
Y. Ishai and E. Kushilevitz. Randomizing Polynomials: A New Representation with Applications to Round-Efficient Secure Computation. In Proc. of 41st FOCS, pages 294-304, 2000.
-
(2000)
Proc. of 41st FOCS
, pp. 294-304
-
-
Ishai, Y.1
Kushilevitz, E.2
-
22
-
-
0033720713
-
On the efficiency of local decoding procedures for errorcorrecting codes
-
J. Katz and L. Trevisan. On the efficiency of local decoding procedures for errorcorrecting codes. In Proc. of 32nd STOC, pages 80-86, 2000.
-
(2000)
Proc. of 32nd STOC
, pp. 80-86
-
-
Katz, J.1
Trevisan, L.2
-
23
-
-
0038107747
-
Exponential lower bound for 2-query locally decodable codes via a quantum argument
-
I. Kerenidis and R. de Wolf. Exponential lower bound for 2-query locally decodable codes via a quantum argument. In Proc. of 35th STOC, pages 106-115, 2003.
-
(2003)
Proc. of 35th STOC
, pp. 106-115
-
-
Kerenidis, I.1
De Wolf, R.2
-
24
-
-
0001959541
-
Replication is not needed: Single database, computationally-private information retrieval
-
E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proc. of 38th FOCS, pages 364373, 1997.
-
(1997)
Proc. of 38th FOCS
, pp. 364373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
25
-
-
0003625461
-
-
Master's thesis, Technion Israel Institute of Technology, Haifa
-
E. Mann. Private access to distributed information. Master's thesis, Technion Israel Institute of Technology, Haifa, 1998.
-
(1998)
Private Access to Distributed Information.
-
-
Mann, E.1
-
26
-
-
0034819509
-
Communication Preserving Protocols for Secure Function Evaluation
-
M. Naor and K. Nissim. Communication Preserving Protocols for Secure Function Evaluation. In Proc. of 33rd STOC, pages 590-599, 2001.
-
(2001)
Proc. of 33rd STOC
, pp. 590-599
-
-
Naor, M.1
Nissim, K.2
-
27
-
-
0032669864
-
Oblivious transfer and polynomial evaluation
-
M. Naor and B. Pinkas. Oblivious transfer and polynomial evaluation. Proc. 31st STOC, pages 245-254, 1999.
-
(1999)
Proc. 31st STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
29
-
-
84959056761
-
Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes
-
K. Obata. Optimal Lower Bounds for 2-Query Locally Decodable Linear Codes. In Proc. of 6th RANDOM, pages 39-50, 2002.
-
(2002)
Proc. of 6th RANDOM
, pp. 39-50
-
-
Obata, K.1
|