메뉴 건너뛰기




Volumn 20, Issue 3, 2007, Pages 295-321

Robust information-theoretic private information retrieval

Author keywords

Distributed databases; Fault tolerance computation; Information theoretic secure protocols; Privacy

Indexed keywords

BYZANTINE SERVERS; COMMUNICATION PROBLEMS; GENERIC TRANSFORMATION; PIR PROTOCOLS;

EID: 34547151180     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-007-0424-2     Document Type: Article
Times cited : (33)

References (67)
  • 1
    • 0000391239 scopus 로고
    • Explicit construction of exponential sized families of k-independent sets
    • N. Alon. Explicit construction of exponential sized families of k-independent sets. Discrete Math., 58:191-193, 1986.
    • (1986) Discrete Math , vol.58 , pp. 191-193
    • Alon, N.1
  • 2
    • 0000156664 scopus 로고    scopus 로고
    • Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions
    • N. Alon and M. Naor. Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions. Algorithmica, 16:434-449, 1996.
    • (1996) Algorithmica , vol.16 , pp. 434-449
    • Alon, N.1    Naor, M.2
  • 3
    • 84951063457 scopus 로고    scopus 로고
    • Upper bound on the communication complexity of private information, retrieval
    • P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th International Colloquium on Automata, Languages and Programming, of, Berlin
    • A. Ambainis. Upper bound on the communication complexity of private information, retrieval. In P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th International Colloquium on Automata, Languages and Programming, pages 401-407. Volume 1256 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1997.
    • (1997) Lecture Notes in Computer Science. Springer-Verlag , vol.1256 , pp. 401-407
    • Ambainis, A.1
  • 4
    • 0000525949 scopus 로고    scopus 로고
    • Some recursive constructions for perfect hash families
    • M. Atici, S. S. Magliveras, D. R. Stinson, and W. D. Wei. Some recursive constructions for perfect hash families. J. Combin. Des., 4:353-363, 1996.
    • (1996) J. Combin. Des , vol.4 , pp. 353-363
    • Atici, M.1    Magliveras, S.S.2    Stinson, D.R.3    Wei, W.D.4
  • 5
    • 33745511846 scopus 로고    scopus 로고
    • D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In C. Choffrut and T. Lengauer, editors, STACS '90, 7th Symp. on Theoretical Aspects of Computer Science, pages 37-48. 415 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1990.
    • D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In C. Choffrut and T. Lengauer, editors, STACS '90, 7th Symp. on Theoretical Aspects of Computer Science, pages 37-48. Volume 415 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1990.
  • 6
    • 0001870201 scopus 로고    scopus 로고
    • D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: improvements and applications. J. Cryptology, 10(1):17-36, 1997. Early version: Security with small communication overhead, CRYPTO '90, pages 62-76. 537 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1991.
    • D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: improvements and applications. J. Cryptology, 10(1):17-36, 1997. Early version: Security with small communication overhead, CRYPTO '90, pages 62-76. Volume 537 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1991.
  • 7
    • 33646508997 scopus 로고    scopus 로고
    • Nearly tight bounds for private information retrieval systems
    • R. Beigel, L. Fortnow, and W. Gasarch. Nearly tight bounds for private information retrieval systems. Comput. Complexity, 15(1):82-91, 2006.
    • (2006) Comput. Complexity , vol.15 , Issue.1 , pp. 82-91
    • Beigel, R.1    Fortnow, L.2    Gasarch, W.3
  • 8
    • 84879524288 scopus 로고    scopus 로고
    • A. Beimel and Y. Ishai. Information-theoretic private information retrieval: a unified construction. In P. G. Spirakis and J. van Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 912-926. 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001. Journal version in [9].
    • A. Beimel and Y. Ishai. Information-theoretic private information retrieval: a unified construction. In P. G. Spirakis and J. van Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 912-926. Volume 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001. Journal version in [9].
  • 9
    • 21144453606 scopus 로고    scopus 로고
    • General constructions for information-theoretic private information retrieval
    • 213-247, Journal version of [37] and [8
    • A. Beimel, Y. Ishai, and E. Kushilevitz. General constructions for information-theoretic private information retrieval. J. Comput. System Sci., 71(2):213-247, 2005. Journal version of [37] and [8].
    • (2005) J. Comput. System Sci , vol.71 , Issue.2
    • Beimel, A.1    Ishai, Y.2    Kushilevitz, E.3
  • 12
    • 4344573261 scopus 로고    scopus 로고
    • A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers' computation in private information retrieval: PIR with preprocessing. J. Cryptology, 17(2): 125-151, 2004. Preliminary version: M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, pages 56-74. 1880 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
    • A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers' computation in private information retrieval: PIR with preprocessing. J. Cryptology, 17(2): 125-151, 2004. Preliminary version: M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, pages 56-74. Volume 1880 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
  • 13
    • 35248899190 scopus 로고    scopus 로고
    • Robust information-theoretic private information retrieval
    • S. Cimato, C. Galdi, and G. Persiano, editors, Proc. of the 3rd Conf. on Security in Communication Networks, of, Berlin
    • A. Beimel and Y. Stahl. Robust information-theoretic private information retrieval. In S. Cimato, C. Galdi, and G. Persiano, editors, Proc. of the 3rd Conf. on Security in Communication Networks, pages 326-341. Volume 2576 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
    • (2002) Lecture Notes in Computer Science. Springer-Verlag , vol.2576 , pp. 326-341
    • Beimel, A.1    Stahl, Y.2
  • 14
    • 0345952600 scopus 로고    scopus 로고
    • Combinatorial designs and their applications
    • S. R. Blackburn. Combinatorial designs and their applications. Res. Notes Math., 403:44-70, 1999.
    • (1999) Res. Notes Math , vol.403 , pp. 44-70
    • Blackburn, S.R.1
  • 15
    • 0347112387 scopus 로고    scopus 로고
    • Perfect hash families: Probabilistic methods and explicit constructions
    • S. R. Blackburn. Perfect hash families: probabilistic methods and explicit constructions. J. Combin. Theory Ser. A, 92:54-60, 2000.
    • (2000) J. Combin. Theory Ser. A , vol.92 , pp. 54-60
    • Blackburn, S.R.1
  • 16
    • 84947917753 scopus 로고    scopus 로고
    • Efficient multiplicative sharing schemes
    • U. Maurer, editor, Advances in Cryptology, EUROCRYPT '96, of, Berlin
    • S. R. Blackburn, M. Burmester, Y. Desmedt, and P. R. Wild. Efficient multiplicative sharing schemes. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, pages 107-118. Volume 1070 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1996.
    • (1996) Lecture Notes in Computer Science. Springer-Verlag , vol.1070 , pp. 107-118
    • Blackburn, S.R.1    Burmester, M.2    Desmedt, Y.3    Wild, P.R.4
  • 18
    • 85062838317 scopus 로고    scopus 로고
    • G. R. Blakley. Safeguarding cryptographic keys. In R. E. Merwin, J. T. Zanca, and M. Smith, editors, Proc. of the 1979 AFIPS National Computer Conf, pages 313-317. 48 of AFIPS Conference Proceedings. AFIPS Press, Reston, VA, 1979.
    • G. R. Blakley. Safeguarding cryptographic keys. In R. E. Merwin, J. T. Zanca, and M. Smith, editors, Proc. of the 1979 AFIPS National Computer Conf, pages 313-317. Volume 48 of AFIPS Conference Proceedings. AFIPS Press, Reston, VA, 1979.
  • 19
    • 1642602228 scopus 로고    scopus 로고
    • Computationally private information retrieval with polylogarithmic communication
    • J. Stern, editor, Advances in Cryptology, EUROCRYPT '99, of, Berlin
    • C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, pages 402-414. Volume 1592 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.
    • (1999) Lecture Notes in Computer Science. Springer-Verlag , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 21
    • 35048871699 scopus 로고    scopus 로고
    • Single database private information retrieval with logarithmic communication
    • Information Security and Privacy: 9th Australasian Conf, ACISP, of, Berlin
    • Y.-C. Chang. Single database private information retrieval with logarithmic communication. In Information Security and Privacy: 9th Australasian Conf, ACISP 2004, pages 50-61. Volume 3108 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2004.
    • (2004) Lecture Notes in Computer Science. Springer-Verlag , vol.3108 , pp. 50-61
    • Chang, Y.-C.1
  • 23
    • 0032201622 scopus 로고    scopus 로고
    • B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th IEEE Symp. on Foundations of Computer Science, pages 41-5.1, 1995. Journal version: J. ACM, 45:965-981, 1998.
    • B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th IEEE Symp. on Foundations of Computer Science, pages 41-5.1, 1995. Journal version: J. ACM, 45:965-981, 1998.
  • 25
    • 0036287481 scopus 로고    scopus 로고
    • A. Deshpande, R. Jain, T Kavita, V. Lokam, and J. Radhakrishnan. Lower bounds for adaptive locally decodable codes. Random Structures Algorithms, 27(3):358-378,2005. Conference version: Proc. of the 17th IEEE Conf. on Computational Complexity, pages 184-193, 2002.
    • A. Deshpande, R. Jain, T Kavita, V. Lokam, and J. Radhakrishnan. Lower bounds for adaptive locally decodable codes. Random Structures Algorithms, 27(3):358-378,2005. Conference version: Proc. of the 17th IEEE Conf. on Computational Complexity, pages 184-193, 2002.
  • 26
    • 0012523350 scopus 로고    scopus 로고
    • G. Di-Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. J. Cryptology, 14(1):37-74, 2001. Preliminary version in Proc. of the 17 th ACM Symp. on Principles of Distributed Computing, pages 91-100, 1998.
    • G. Di-Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. J. Cryptology, 14(1):37-74, 2001. Preliminary version in Proc. of the 17 th ACM Symp. on Principles of Distributed Computing, pages 91-100, 1998.
  • 27
    • 80051636706 scopus 로고    scopus 로고
    • Single-database private information retrieval implies oblivious transfer
    • Advances in Cryptology, EUROCRYPT, of, Berlin
    • G. Di-Crescenzo, T. Malkin, and R. Ostrovsky. Single-database private information retrieval implies oblivious transfer. In Advances in Cryptology - EUROCRYPT 2000, pages 122-138. Volume 1807 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
    • (2000) Lecture Notes in Computer Science. Springer-Verlag , vol.1807 , pp. 122-138
    • Di-Crescenzo, G.1    Malkin, T.2    Ostrovsky, R.3
  • 28
    • 84879521412 scopus 로고    scopus 로고
    • J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. In P. G. Spirakis and J. van. Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 927-938. 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001.
    • J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. In P. G. Spirakis and J. van. Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 927-938. Volume 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001.
  • 29
    • 84979291225 scopus 로고
    • Broadcast encryption
    • D. R. Stinson, editor, Advances in Cryptology, CRYPTO '93, of, Berlin
    • A. Fiat and M. Naor. Broadcast encryption. In D. R. Stinson, editor, Advances in Cryptology - CRYPTO '93, pages 480-491. Volume 773 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1994.
    • (1994) Lecture Notes in Computer Science. Springer-Verlag , vol.773 , pp. 480-491
    • Fiat, A.1    Naor, M.2
  • 30
    • 0002302934 scopus 로고
    • On the size of separating systems and families of perfect hash functions
    • M. L. Fredman and J. Komlós. On the size of separating systems and families of perfect hash functions. SIAM J. Algebraic Discrete Methods, 5:61-68, 1984.
    • (1984) SIAM J. Algebraic Discrete Methods , vol.5 , pp. 61-68
    • Fredman, M.L.1    Komlós, J.2
  • 31
    • 0021467937 scopus 로고
    • Storing a sparse table with O(1) worst case access time
    • M. L. Fredman, J. Komlós, and E. Szemerédi. Storing a sparse table with O(1) worst case access time. J. ACM, 31(3):538-544, 1984.
    • (1984) J. ACM , vol.31 , Issue.3 , pp. 538-544
    • Fredman, M.L.1    Komlós, J.2    Szemerédi, E.3
  • 32
    • 21144442219 scopus 로고    scopus 로고
    • A survey on private information retrieval
    • Can also be found at
    • W. Gasarch. A survey on private information retrieval. Bull. Eur: Assoc. Theor: Comput. Sci., 82:72-107, 2004. Can also be found at: http://www.cs.umd.edu/~gasarch/pir/pir.html.
    • (2004) Bull. Eur: Assoc. Theor: Comput. Sci , vol.82 , pp. 72-107
    • Gasarch, W.1
  • 33
    • 26444512068 scopus 로고    scopus 로고
    • Single-database private information retrieval with constant communication rate
    • L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, of, Berlin
    • C. Gentry and Z. Ramzan. Single-database private information retrieval with constant communication rate. In L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, pages 803-815. Volume 3580 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2005.
    • (2005) Lecture Notes in Computer Science. Springer-Verlag , vol.3580 , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2
  • 34
    • 84937574654 scopus 로고    scopus 로고
    • Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval. In M. Luby, J. Rolim, and M. Serna, editors, RANDOM '98, 2nd International Workshop on Randomization and Approximation Techniques in Computer Science, pages 200-217. 1518 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
    • Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval. In M. Luby, J. Rolim, and M. Serna, editors, RANDOM '98, 2nd International Workshop on Randomization and Approximation Techniques in Computer Science, pages 200-217. Volume 1518 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
  • 35
    • 0034205020 scopus 로고    scopus 로고
    • Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. J. Comput. System Sci., 60(3):592-629, 2000. Conference version in Proc. of the 30th ACM Symp. on the Theory of Computing, pages 151-160, 1998.
    • Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. J. Comput. System Sci., 60(3):592-629, 2000. Conference version in Proc. of the 30th ACM Symp. on the Theory of Computing, pages 151-160, 1998.
  • 37
    • 0032650474 scopus 로고    scopus 로고
    • Improved upper bounds on information theoretic private information retrieval
    • Journal version in [9
    • Y. Ishai and E. Kushilevitz. Improved upper bounds on information theoretic private information retrieval. In Proc. of the 31st ACM Symp. on the Theory of Computing, pages 79-88, 1999. Journal version in [9].
    • (1999) Proc. of the 31st ACM Symp. on the Theory of Computing , pp. 79-88
    • Ishai, Y.1    Kushilevitz, E.2
  • 39
    • 0035129748 scopus 로고    scopus 로고
    • On lower bounds for the communication complexity of private information retrieval
    • T. Itoh. On lower bounds for the communication complexity of private information retrieval. IEICE Trans. Fund. Electron. Commun. Comput. Sci., E84-A(1): 157-164, 2001.
    • (2001) IEICE Trans. Fund. Electron. Commun. Comput. Sci , vol.E84-A , Issue.1 , pp. 157-164
    • Itoh, T.1
  • 41
    • 4544225791 scopus 로고    scopus 로고
    • Exponential lower bound for 2-query locally decodable codes via a quantum. argument
    • I. Kerenidis and R. de Wolf. Exponential lower bound for 2-query locally decodable codes via a quantum. argument. J. Comput. System Sci., 69(3):395-420, 2004.
    • (2004) J. Comput. System Sci , vol.69 , Issue.3 , pp. 395-420
    • Kerenidis, I.1    de Wolf, R.2
  • 42
    • 85013451536 scopus 로고
    • New bounds for perfect hashing via information theory
    • J. Korner and Marton. New bounds for perfect hashing via information theory. Eur. J. Combin., 9:523-530, 1988.
    • (1988) Eur. J. Combin , vol.9 , pp. 523-530
    • Korner, J.1    Marton2
  • 44
    • 84948954750 scopus 로고    scopus 로고
    • One-way trapdoor permutations are sufficient for single-database computationally-private information retrieval
    • B. Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Berlin
    • E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for single-database computationally-private information retrieval. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, pages 104-121. Volume 1807 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
    • (2000) Lecture Notes in Computer Science. Springer-Verlag , vol.1807 , pp. 104-121
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 45
    • 33645970169 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • J. Zhou and J. Lopez, editors, Pmc. of the 8th Information Security Conference ISC'05, of, Berlin
    • H. Lipmaa. An oblivious transfer protocol with log-squared communication. In J. Zhou and J. Lopez, editors, Pmc. of the 8th Information Security Conference (ISC'05), pages 314-328. Volume 3650 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2005.
    • (2005) Lecture Notes in Computer Science. Springer-Verlag , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 47
    • 0003625461 scopus 로고    scopus 로고
    • Master's thesis, Technion, Israel Institute of Technology, Haifa
    • E. Mann. Private access to distributed information. Master's thesis, Technion - Israel Institute of Technology, Haifa, 1998.
    • (1998) Private access to distributed information
    • Mann, E.1
  • 48
    • 0040789424 scopus 로고
    • Data Structures and Algorithms
    • Springer-Verlag, New York
    • K. Mehlhorn. Data Structures and Algorithms, volume 1. Sorting and Searching. Springer-Verlag, New York, 1984.
    • (1984) Sorting and Searching , vol.1
    • Mehlhorn, K.1
  • 51
    • 0038828072 scopus 로고
    • Lower bounds on formula size of Boolean functions using hypergraph entropy
    • I. Newman and A. Wigderson. Lower bounds on formula size of Boolean functions using hypergraph entropy. SIAM J. Discrete Math., 8:536-542, 1995.
    • (1995) SIAM J. Discrete Math , vol.8 , pp. 536-542
    • Newman, I.1    Wigderson, A.2
  • 52
    • 84959056761 scopus 로고    scopus 로고
    • K. Obata. Optimal lower bounds for 2-query locally decodable linear codes. In J. D. P. Rolim and S. Vadhan, editors, RANDOM '02, 6th International Workshop on Randomization and Approximation Techniques in Computer Science, pages 39-50. 2483 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
    • K. Obata. Optimal lower bounds for 2-query locally decodable linear codes. In J. D. P. Rolim and S. Vadhan, editors, RANDOM '02, 6th International Workshop on Randomization and Approximation Techniques in Computer Science, pages 39-50. Volume 2483 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
  • 55
    • 0001174154 scopus 로고
    • Polynomial codes over certain finite fields
    • I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. J. SIAM, 8:300-304, 1960.
    • (1960) J. SIAM , vol.8 , pp. 300-304
    • Reed, I.S.1    Solomon, G.2
  • 56
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Commun. ACM, 22:612-613, 1979.
    • (1979) Commun. ACM , vol.22 , pp. 612-613
    • Shamir, A.1
  • 57
    • 31644447365 scopus 로고    scopus 로고
    • An optimal lower bound for 2-query locally decodable linear codes
    • D. Shiowattana and S. V. Lokam. An optimal lower bound for 2-query locally decodable linear codes. Inform. Process. Lett., 97(6):244-250, 2006.
    • (2006) Inform. Process. Lett , vol.97 , Issue.6 , pp. 244-250
    • Shiowattana, D.1    Lokam, S.V.2
  • 58
    • 65749117216 scopus 로고
    • On tape versus core; an application of space efficient perfect hash functions to the invariance of space
    • C. Slot and P. van Emde Boas. On tape versus core; an application of space efficient perfect hash functions to the invariance of space. In Proc. of the 16th ACM Symp. on the Theory of Computing, pages 391-400, 1984.
    • (1984) Proc. of the 16th ACM Symp. on the Theory of Computing , pp. 391-400
    • Slot, C.1    van Emde Boas, P.2
  • 59
    • 0017551771 scopus 로고
    • Perfect hashing functions: A single probe retrieving method for static sets
    • R. Sprugnoli. Perfect hashing functions: a single probe retrieving method for static sets. Commun. ACM, 20(11):841-850, 1977.
    • (1977) Commun. ACM , vol.20 , Issue.11 , pp. 841-850
    • Sprugnoli, R.1
  • 60
    • 84947772655 scopus 로고    scopus 로고
    • A new and efficient all-or-nothing disclosure of secrets protocol
    • K. Ohta and D. Pei, editors, Advances in Cryptology, ASIACRYPT '98, of, Berlin
    • J. P. Stern. A new and efficient all-or-nothing disclosure of secrets protocol. In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, pages 357-371. Volume 1514 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
    • (1998) Lecture Notes in Computer Science. Springer-Verlag , vol.1514 , pp. 357-371
    • Stern, J.P.1
  • 61
    • 0000137420 scopus 로고    scopus 로고
    • Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
    • D. Stinson, T. van Trung, and R. Wei. Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. J. Statist. Plann. Inference, 86(2):595-617, 2000.
    • (2000) J. Statist. Plann. Inference , vol.86 , Issue.2 , pp. 595-617
    • Stinson, D.1    van Trung, T.2    Wei, R.3
  • 62
    • 0039591714 scopus 로고    scopus 로고
    • New constructions for perfect hash families and related structures using combinatorial designs and codes
    • D. R. Stinson, R. Wei, and L. Zhu. New constructions for perfect hash families and related structures using combinatorial designs and codes. J. Combin. Designs, 8:189-200, 2000.
    • (2000) J. Combin. Designs , vol.8 , pp. 189-200
    • Stinson, D.R.1    Wei, R.2    Zhu, L.3
  • 63
    • 0018543294 scopus 로고
    • Storing a sparse table
    • R. E. Tarjan and A. C. Yao. Storing a sparse table. Commun. ACM, 22(11):606-611, 1979.
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 606-611
    • Tarjan, R.E.1    Yao, A.C.2
  • 64
    • 26444620133 scopus 로고    scopus 로고
    • Improved lower bounds for locally decodable codes and private information retrieval
    • L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, of, Berlin
    • S. Wehner and R. de Wolf. Improved lower bounds for locally decodable codes and private information retrieval. In L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, pages 1424-1436. Volume 3580 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2005.
    • (2005) Lecture Notes in Computer Science. Springer-Verlag , vol.3580 , pp. 1424-1436
    • Wehner, S.1    de Wolf, R.2
  • 66
    • 84958777058 scopus 로고    scopus 로고
    • Private information retrieval based on the subgroup membership problem
    • V. Varadharajan and Y. Mu, editors, ACISP, of, Berlin
    • A. Yamamura and T. Saito. Private information retrieval based on the subgroup membership problem. In V. Varadharajan and Y. Mu, editors, ACISP 2001, pages 206-220. Volume 2119 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001.
    • (2001) Lecture Notes in Computer Science. Springer-Verlag , vol.2119 , pp. 206-220
    • Yamamura, A.1    Saito, T.2
  • 67
    • 0036387035 scopus 로고    scopus 로고
    • E. Y. Yang, J. Xu, and K. H. Bennett. Private information retrieval in the presence of malicious failures. In Proc. of the 26th IEEE International Computer Software and Applications Conference, pages 805-812, 2002
    • E. Y. Yang, J. Xu, and K. H. Bennett. Private information retrieval in the presence of malicious failures. In Proc. of the 26th IEEE International Computer Software and Applications Conference, pages 805-812, 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.