메뉴 건너뛰기




Volumn 4117 LNCS, Issue , 2006, Pages 555-569

On robust combiners for private information retrieval and other primitives

Author keywords

Bit commitment; Cryptographic primitives; Oblivious transfer; Private information retrieval; Reductions; Robust combiners

Indexed keywords

CRYPTOGRAPHY; DATA TRANSFER; INFORMATION THEORY; ROBUSTNESS (CONTROL SYSTEMS); SECURITY OF DATA; THEOREM PROVING;

EID: 33749557902     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11818175_33     Document Type: Conference Paper
Times cited : (21)

References (27)
  • 1
    • 0019669180 scopus 로고
    • An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
    • [AB81]
    • [AB81] C. A. Asmuth and G. R. Blakely. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems. Computers and Mathematics with Applications, 7:447-450, 1981.
    • (1981) Computers and Mathematics with Applications , vol.7 , pp. 447-450
    • Asmuth, C.A.1    Blakely, G.R.2
  • 2
    • 0032687055 scopus 로고    scopus 로고
    • One-way functions are essential for single-server private information retrieval
    • [BIKM99]
    • [BIKM99] A. Beimel, Y. Ishai, E. Kushilevitz, and T. Malkin. One-way functions are essential for single-server private information retrieval. In Proc. ACM STOC, pages 89-98, 1999.
    • (1999) Proc. ACM STOC , pp. 89-98
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 3
    • 21144446985 scopus 로고    scopus 로고
    • Decoding of interleaved Reed-Solomon codes over noisy data
    • [BKY03]
    • [BKY03] D. Bleichenbacher, A. Kiayias, and M. Yung. Decoding of interleaved Reed-Solomon codes over noisy data. In Proc. ICALP 2003, pages 97-108, 2003.
    • (2003) Proc. ICALP 2003 , pp. 97-108
    • Bleichenbacher, D.1    Kiayias, A.2    Yung, M.3
  • 5
    • 0024132071 scopus 로고
    • Achieving oblivious transfer using weakened security assumptions
    • [CK88]
    • [CK88] C. Crépeau and J. Kilian. Achieving oblivious transfer using weakened security assumptions (extended abstract). In Proc. IEEE FOCS '88, pages 42-52, 1988.
    • (1988) Proc. IEEE FOCS '88 , pp. 42-52
    • Crépeau, C.1    Kilian, J.2
  • 6
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • [CKGS98]
    • [CKGS98] B. Chor, E. Kushilevitz, O. Goldreich, and M. Sudan. Private information retrieval. J. ACM, 45(6):965-981, 1998.
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 7
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • [CMS99]
    • [CMS99] C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In Proc. Eurocrypt '99, pages 402-414, 1999.
    • (1999) Proc. Eurocrypt '99 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 8
    • 85030121757 scopus 로고
    • Equivalence between two flavours of oblivious transfers
    • [Cré87]
    • [Cré87] C. Crépeau. Equivalence between two flavours of oblivious transfers. In Proc. Crypto '87, pages 350-354, 1987.
    • (1987) Proc. Crypto '87 , pp. 350-354
    • Crépeau, C.1
  • 9
    • 0012523350 scopus 로고    scopus 로고
    • Universal service-providers for private information retrieval
    • [DIO01]
    • [DIO01] G. Di Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. Journal of Cryptology, 14(1):37-74, 2001.
    • (2001) Journal of Cryptology , vol.14 , Issue.1 , pp. 37-74
    • Di Crescenzo, G.1    Ishai, Y.2    Ostrovsky, R.3
  • 10
    • 24144468589 scopus 로고    scopus 로고
    • Chosen-ciphertext security of multiple encryption
    • [DK05]
    • [DK05] Y. Dodis and J. Katz. Chosen-ciphertext security of multiple encryption. In Proc. TCC '05, pages 188-209, 2005.
    • (2005) Proc. TCC '05 , pp. 188-209
    • Dodis, Y.1    Katz, J.2
  • 11
    • 80051636706 scopus 로고    scopus 로고
    • Single database private information retrieval implies oblivious transfer
    • [DMO00]
    • [DMO00] G. Di Crescenzo, T. Malkin, and R. Ostrovsky. Single database private information retrieval implies oblivious transfer. In Proc. Eurocrypt '00, pages 122-138, 2000.
    • (2000) Proc. Eurocrypt '00 , pp. 122-138
    • Di Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 12
    • 0022069123 scopus 로고
    • On the power of cascade ciphers
    • [EG85]
    • [EG85] S. Even and O. Goldreich. On the power of cascade ciphers. ACM Trans. Comput. Syst., 3(2): 108-116, 1985.
    • (1985) ACM Trans. Comput. Syst. , vol.3 , Issue.2 , pp. 108-116
    • Even, S.1    Goldreich, O.2
  • 13
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • [EGL85]
    • [EGL85] S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 14
    • 84944900656 scopus 로고    scopus 로고
    • On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function
    • [Fis02]
    • [Fis02] M. Fischlin. On the impossibility of constructing non-interactive statistically-secret protocols from any trapdoor one-way function. In Proc. CT-RSA, pages 79-95, 2002.
    • (2002) Proc. CT-RSA , pp. 79-95
    • Fischlin, M.1
  • 15
    • 21144442219 scopus 로고    scopus 로고
    • A survey on private information retrieval (column: Computational complexity)
    • [Gas04]
    • [Gas04] W. I. Gasarch. A survey on private information retrieval (column: Computational complexity). Bulletin of the EATCS, 82:72-107, 2004.
    • (2004) Bulletin of the EATCS , vol.82 , pp. 72-107
    • Gasarch, W.I.1
  • 16
    • 0003979335 scopus 로고    scopus 로고
    • [Gol04], Basic Applications. Cambridge University Press
    • [Gol04] O. Goldreich. The Foundations of Cryptography, volume II, Basic Applications. Cambridge University Press, 2004.
    • (2004) The Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 17
    • 24944508356 scopus 로고    scopus 로고
    • Implementing oblivious transfer using collection of dense trapdoor permutations
    • [Hai04]
    • [Hai04] I. Haitner. Implementing oblivious transfer using collection of dense trapdoor permutations. In Proc. TCC'04, pages 394-409, 2004.
    • (2004) Proc. TCC'04 , pp. 394-409
    • Haitner, I.1
  • 18
    • 24144475180 scopus 로고    scopus 로고
    • On tolerant cryptographic constructions
    • [Her05]. full version on Cryptology ePrint Archive, eprint.iacr.org/2002/ 135
    • [Her05] A. Herzberg. On tolerant cryptographic constructions. In CT-RSA, pages 172-190, 2005. full version on Cryptology ePrint Archive, eprint.iacr.org/2002/135.
    • (2005) CT-RSA , pp. 172-190
    • Herzberg, A.1
  • 19
    • 24944472289 scopus 로고    scopus 로고
    • On robust combiners for oblivious transfer and other primitives
    • [HKN+05]
    • [HKN+05] D. Harnik, J. Kilian, M. Naor, O. Reingold, and A. Rosen. On robust combiners for oblivious transfer and other primitives. In Proc. Eurocrypt '05, pages 96-113, 2005.
    • (2005) Proc. Eurocrypt '05 , pp. 96-113
    • Harnik, D.1    Kilian, J.2    Naor, M.3    Reingold, O.4    Rosen, A.5
  • 20
    • 24144493423 scopus 로고    scopus 로고
    • How to securely outsource cryptographic computations
    • [HL05]
    • [HL05] S. Hohenberger and A. Lysyanskaya. How to securely outsource cryptographic computations. In Proc. TCC '05, pages 264-282, 2005.
    • (2005) Proc. TCC '05 , pp. 264-282
    • Hohenberger, S.1    Lysyanskaya, A.2
  • 21
    • 0024866742 scopus 로고
    • Limits on the provable consequences of one-way permutations
    • [IR89]
    • [IR89] R. Impagliazzo and S. Rudich. Limits on the provable consequences of one-way permutations. In Proc. ACM STOC, pages 44-61, 1989.
    • (1989) Proc. ACM STOC , pp. 44-61
    • Impagliazzo, R.1    Rudich, S.2
  • 22
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • [KO97]
    • [KO97] E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private information retrieval. In Proc. IEEE FOCS '00, pages 364-373, 1997.
    • (1997) Proc. IEEE FOCS '00 , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 23
    • 84948954750 scopus 로고    scopus 로고
    • One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval
    • [KO00]
    • [KO00] E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. In Proc. Eurocrypt '00, pages 104-121, 2000.
    • (2000) Proc. Eurocrypt '00 , pp. 104-121
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 24
    • 84879518622 scopus 로고    scopus 로고
    • Secure games with polynomial expressions
    • [KY01]
    • [KY01] A. Kiayias and M. Yung. Secure games with polynomial expressions. In Proc. IC ALP 2001, pages 939-950, 2001.
    • (2001) Proc. IC ALP 2001 , pp. 939-950
    • Kiayias, A.1    Yung, M.2
  • 26
    • 0001448484 scopus 로고
    • Bit commitment using pseudorandomness
    • [Nao91]
    • [Nao91] M. Naor. Bit commitment using pseudorandomness. J. Cryptology, 4(2):151-158, 1991.
    • (1991) J. Cryptology , vol.4 , Issue.2 , pp. 151-158
    • Naor, M.1
  • 27
    • 0003462641 scopus 로고
    • How to exchange secrets by oblivious transfer
    • [Rab81], Aiken Computation Laboratory, available at eprint.iacr.org/2005/ 187
    • [Rab81] M. O. Rabin. How to exchange secrets by oblivious transfer., 1981. Tech. Memo TR-81, Aiken Computation Laboratory, available at eprint.iacr.org/2005/187.
    • (1981) Tech. Memo , vol.TR-81
    • Rabin, M.O.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.