메뉴 건너뛰기




Volumn , Issue , 2007, Pages 131-145

Improving the robustness of private information retrieval

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; DATA PRIVACY; DATABASE SYSTEMS; MATHEMATICAL MODELS; NETWORK PROTOCOLS; SENSITIVITY ANALYSIS; SERVERS;

EID: 34548787882     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2007.23     Document Type: Conference Paper
Times cited : (141)

References (17)
  • 2
    • 35248899190 scopus 로고    scopus 로고
    • A. Beimel and Y. Stahl. Robust Information-Theoretic Private Information Retrieval. In Third Conference on Security in Communication Networks, Lecture Notes in Computer Science 2576, pages 326-341. Springer-Verlag, 2002.
    • A. Beimel and Y. Stahl. Robust Information-Theoretic Private Information Retrieval. In Third Conference on Security in Communication Networks, Lecture Notes in Computer Science 2576, pages 326-341. Springer-Verlag, 2002.
  • 6
    • 34548780603 scopus 로고    scopus 로고
    • project on SourceForge
    • I. Goldberg. Percy++ project on SourceForge. http://percy.sourceforge. net/.
    • Percy
    • Goldberg, I.1
  • 7
    • 0033183669 scopus 로고    scopus 로고
    • Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes
    • September
    • V. Guruswami and M. Sudan. Improved Decoding of Reed-Solomon and Algebraic-Geometry Codes. IEEE Transactions on Information Theory, 45(6):1757-1767, September 1999.
    • (1999) IEEE Transactions on Information Theory , vol.45 , Issue.6 , pp. 1757-1767
    • Guruswami, V.1    Sudan, M.2
  • 8
    • 0031378815 scopus 로고    scopus 로고
    • Replication is Not Needed: Single Database, Computationally Private Information Retrieval
    • October
    • E. Kushilevitz and R. Ostrovsky. Replication is Not Needed: Single Database, Computationally Private Information Retrieval. In 38th Annual Symposium on Foundations of Computer Science, pages 364-373, October 1997.
    • (1997) 38th Annual Symposium on Foundations of Computer Science , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 9
    • 24144474940 scopus 로고    scopus 로고
    • S. Micali, C. Peikert, M. Sudan, and D. A. Wilson. Optimal Error Correction Against Computationally Bounded Noise. In Theory of Cryptography, Second Theory of Cryptography Conference, Lecture Notes in Computer Science 3378, pages 1-16. Springer-Verlag, February 2005.
    • S. Micali, C. Peikert, M. Sudan, and D. A. Wilson. Optimal Error Correction Against Computationally Bounded Noise. In Theory of Cryptography, Second Theory of Cryptography Conference, Lecture Notes in Computer Science 3378, pages 1-16. Springer-Verlag, February 2005.
  • 10
    • 84942550998 scopus 로고    scopus 로고
    • Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
    • Advances in Cryptology, Eurocrypt '99, Springer-Verlag
    • P. Paillier. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In Advances in Cryptology - Eurocrypt '99, Lecture Notes in Computer Science 1592, pages 223-238. Springer-Verlag, 1999.
    • (1999) Lecture Notes in Computer Science , vol.1592 , pp. 223-238
    • Paillier, P.1
  • 12
    • 34548810068 scopus 로고    scopus 로고
    • The Byzantine Postman Problem: A Trivial Attack against PIR-based Nym Servers
    • Technical Report ESAT-COSIC 2007-001, Katholieke Universiteit Leuven, February
    • L. Sassaman and B. Preneel. The Byzantine Postman Problem: A Trivial Attack against PIR-based Nym Servers. Technical Report ESAT-COSIC 2007-001, Katholieke Universiteit Leuven, February 2007.
    • (2007)
    • Sassaman, L.1    Preneel, B.2
  • 14
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir. How to Share a Secret. Communications of the ACM, 22(11):612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 0024141971 scopus 로고
    • How to Share a Secret with Cheaters
    • M. Tompa and H. Woll. How to Share a Secret with Cheaters. J. Cryptology, 1(2):133-138, 1988.
    • (1988) J. Cryptology , vol.1 , Issue.2 , pp. 133-138
    • Tompa, M.1    Woll, H.2
  • 17
    • 0036387035 scopus 로고    scopus 로고
    • E. Y. Yang, J. Xu, and K. H. Bennett. Private Information Retrieval in the Presence of Malicious Failures. In Computer Software and Applications Conference 2002 COMPSAC 2002, August 2002
    • E. Y. Yang, J. Xu, and K. H. Bennett. Private Information Retrieval in the Presence of Malicious Failures. In Computer Software and Applications Conference 2002 (COMPSAC 2002), August 2002.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.