-
1
-
-
0019669180
-
An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
-
[AB81]
-
[AB81] C. A. Asmuth and G. R. Blakely. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Computers and Mathematics with Applications, 7:447-450, 1981.
-
(1981)
Computers and Mathematics with Applications
, vol.7
, pp. 447-450
-
-
Asmuth, C.A.1
Blakely, G.R.2
-
2
-
-
0032687055
-
One-way functions are essential for single-server private information retrieval
-
[BIKM99]
-
[BIKM99] A. Beimel, Y. Ishai, E. Kushilevitz, and T. Malkin. One-way functions are essential for single-server private information retrieval. In Proc. ACM STOC, pages 89-98, 1999.
-
(1999)
Proc. ACM STOC
, pp. 89-98
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
3
-
-
21144446985
-
Decoding of interleaved Reed-Solomon codes over noisy data
-
[BKY03]
-
[BKY03] D. Bleichenbacher, A. Kiayias, and M. Yung. Decoding of interleaved Reed-Solomon codes over noisy data. In Proc. ICALP 2003, pages 97-108, 2003.
-
(2003)
Proc. ICALP 2003
, pp. 97-108
-
-
Bleichenbacher, D.1
Kiayias, A.2
Yung, M.3
-
5
-
-
0024132071
-
Achieving oblivious transfer using weakened security assumptions
-
[CK88]
-
[CK88] C. Crépeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions (extended abstract). In Proc. IEEE FOCS '88, pages 42-52, 1988.
-
(1988)
Proc. IEEE FOCS '88
, pp. 42-52
-
-
Crépeau, C.1
Kilian, J.2
-
6
-
-
0032201622
-
Private information retrieval
-
[CKGS98]
-
[CKGS98] B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 45(6):965-981, 1998.
-
(1998)
J. ACM
, vol.45
, Issue.6
, pp. 965-981
-
-
Chor, B.1
Kushilevitz, E.2
Goldreich, O.3
Sudan, M.4
-
7
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
[CMS99]
-
[CMS99] C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In Proc. Eurocrypt '99, pages 402-414, 1999.
-
(1999)
Proc. Eurocrypt '99
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
8
-
-
85030121757
-
Equivalence between two flavours of oblivious transfers
-
[Cré87]
-
[Cré87] C. Crépeau. Equivalence between two flavours of oblivious transfers. In Proc. Crypto '87, pages 350-354, 1987.
-
(1987)
Proc. Crypto '87
, pp. 350-354
-
-
Crépeau, C.1
-
9
-
-
0012523350
-
Universal service-providers for private information retrieval
-
[DIO01]
-
[DIO01] G. Di Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. Journal of Cryptology, 14(1):37-74, 2001.
-
(2001)
Journal of Cryptology
, vol.14
, Issue.1
, pp. 37-74
-
-
Di Crescenzo, G.1
Ishai, Y.2
Ostrovsky, R.3
-
10
-
-
24144468589
-
Chosen-ciphertext security of multiple encryption
-
[DK05]
-
[DK05] Y. Dodis and J. Katz. Chosen-ciphertext security of multiple encryption. In Proc. TCC '05, pages 188-209, 2005.
-
(2005)
Proc. TCC '05
, pp. 188-209
-
-
Dodis, Y.1
Katz, J.2
-
11
-
-
80051636706
-
Single database private information retrieval implies oblivious transfer
-
[DMO00]
-
[DMO00] G. Di Crescenzo, T. Malkin, and R. Ostrovsky. Single database private information retrieval implies oblivious transfer. In Proc. Eurocrypt '00, pages 122-138, 2000.
-
(2000)
Proc. Eurocrypt '00
, pp. 122-138
-
-
Di Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
12
-
-
0022069123
-
On the power of cascade ciphers
-
[EG85]
-
[EG85] S. Even and O. Goldreich. On the power of cascade ciphers. ACM Trans. Comput. Syst., 3(2): 108-116, 1985.
-
(1985)
ACM Trans. Comput. Syst.
, vol.3
, Issue.2
, pp. 108-116
-
-
Even, S.1
Goldreich, O.2
-
13
-
-
0022080529
-
A randomized protocol for signing contracts
-
[EGL85]
-
[EGL85] S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
14
-
-
84944900656
-
On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function
-
[Fis02]
-
[Fis02] M. Fischlin. On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function. In Proc. CT-RSA, pages 79-95, 2002.
-
(2002)
Proc. CT-RSA
, pp. 79-95
-
-
Fischlin, M.1
-
15
-
-
21144442219
-
A survey on private information retrieval (column: Computational complexity)
-
[Gas04]
-
[Gas04] W. I. Gasarch. A survey on private information retrieval (column: Computational complexity). Bulletin of the EATCS, 82:72-107, 2004.
-
(2004)
Bulletin of the EATCS
, vol.82
, pp. 72-107
-
-
Gasarch, W.I.1
-
16
-
-
0003979335
-
-
[Gol04], Basic Applications. Cambridge University Press
-
[Gol04] O. Goldreich. The Foundations of Cryptography, volume II, Basic Applications. Cambridge University Press, 2004.
-
(2004)
The Foundations of Cryptography
, vol.2
-
-
Goldreich, O.1
-
17
-
-
24944508356
-
Implementing oblivious transfer using collection of dense trapdoor permutations
-
[Hai04]
-
[Hai04] I. Haitner. Implementing oblivious transfer using collection of dense trapdoor permutations. In Proc. TCC'04, pages 394-409, 2004.
-
(2004)
Proc. TCC'04
, pp. 394-409
-
-
Haitner, I.1
-
18
-
-
24144475180
-
On tolerant cryptographic constructions
-
[Her05]. full version on Cryptology ePrint Archive, eprint.iacr.org/2002/ 135
-
[Her05] A. Herzberg. On tolerant cryptographic constructions. In CT-RSA, pages 172-190, 2005. full version on Cryptology ePrint Archive, eprint.iacr.org/2002/135.
-
(2005)
CT-RSA
, pp. 172-190
-
-
Herzberg, A.1
-
19
-
-
24944472289
-
On robust combiners for oblivious transfer and other primitives
-
[HKN+05]
-
[HKN+05] D. Harnik, J. Kilian, M. Naor, O. Reingold, and A. Rosen. On robust combiners for oblivious transfer and other primitives. In Proc. Eurocrypt '05, pages 96-113, 2005.
-
(2005)
Proc. Eurocrypt '05
, pp. 96-113
-
-
Harnik, D.1
Kilian, J.2
Naor, M.3
Reingold, O.4
Rosen, A.5
-
20
-
-
24144493423
-
How to securely outsource cryptographic computations
-
[HL05]
-
[HL05] S. Hohenberger and A. Lysyanskaya. How to securely outsource cryptographic computations. In Proc. TCC '05, pages 264-282, 2005.
-
(2005)
Proc. TCC '05
, pp. 264-282
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
21
-
-
0024866742
-
Limits on the provable consequences of one-way permutations
-
[IR89]
-
[IR89] R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In Proc. ACM STOC, pages 44-61, 1989.
-
(1989)
Proc. ACM STOC
, pp. 44-61
-
-
Impagliazzo, R.1
Rudich, S.2
-
22
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
[KO97]
-
[KO97] E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proc. IEEE FOCS '00, pages 364-373, 1997.
-
(1997)
Proc. IEEE FOCS '00
, pp. 364-373
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
23
-
-
84948954750
-
One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval
-
[KO00]
-
[KO00] E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. In Proc. Eurocrypt '00, pages 104-121, 2000.
-
(2000)
Proc. Eurocrypt '00
, pp. 104-121
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
24
-
-
84879518622
-
Secure games with polynomial expressions
-
[KY01]
-
[KY01] A. Kiayias and M. Yung. Secure games with polynomial expressions. In Proc. IC ALP 2001, pages 939-950, 2001.
-
(2001)
Proc. IC ALP 2001
, pp. 939-950
-
-
Kiayias, A.1
Yung, M.2
-
26
-
-
0001448484
-
Bit commitment using pseudorandomness
-
[Nao91]
-
[Nao91] M. Naor. Bit commitment using pseudorandomness. J. Cryptology, 4(2):151-158, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
27
-
-
0003462641
-
How to exchange secrets by oblivious transfer
-
[Rab81], Aiken Computation Laboratory, available at eprint.iacr.org/2005/ 187
-
[Rab81] M. O. Rabin. How to exchange secrets by oblivious transfer., 1981. Tech. Memo TR-81, Aiken Computation Laboratory, available at eprint.iacr.org/2005/187.
-
(1981)
Tech. Memo
, vol.TR-81
-
-
Rabin, M.O.1
|