-
2
-
-
0017930809
-
-
L. Adleman, R. Rivest, and A. Shamir. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21(2):120-126 (February, 1978).
-
L. Adleman, R. Rivest, and A. Shamir. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Commun. ACM, 21(2):120-126 (February, 1978).
-
-
-
-
3
-
-
79251578513
-
On the (Im)Possibility of Software Obfuscation
-
Crypto, Springer, Berlin
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. Vadhan, and K. Yang. On the (Im)Possibility of Software Obfuscation. In Crypto 2001, pages 1-18. LNCS 2139. Springer, Berlin, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.6
Yang, K.7
-
4
-
-
33751062464
-
New Techniques for Private Stream Searching
-
Technical Report CMU-CS-06-106, Carnegie Mellon University, March
-
J. Bethencourt, D. Song, and B. Waters. New Techniques for Private Stream Searching. Technical Report CMU-CS-06-106, Carnegie Mellon University, March 2006.
-
(2006)
-
-
Bethencourt, J.1
Song, D.2
Waters, B.3
-
5
-
-
36749060176
-
-
J. Bethencourt, D. Song, and B. Waters. New Constructions and Practical Applications for Private Stream. Searching (Extended Abstract) Appeared at http://www.cs.cmu.edu/ bethenco/searcheff.pdf July, 2006.
-
J. Bethencourt, D. Song, and B. Waters. New Constructions and Practical Applications for Private Stream. Searching (Extended Abstract) Appeared at http://www.cs.cmu.edu/ bethenco/searcheff.pdf July, 2006.
-
-
-
-
6
-
-
24144433396
-
Evaluating 2-DNF Formulas on Ciphertexts
-
D. Boneh, E. Goh, and K. Nissim. Evaluating 2-DNF Formulas on Ciphertexts. In TCC, pages 325-341, 2005.
-
(2005)
TCC
, pp. 325-341
-
-
Boneh, D.1
Goh, E.2
Nissim, K.3
-
7
-
-
35048901123
-
Public Key Encryption with Keyword Search
-
D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano. Public Key Encryption with Keyword Search. EUROCRYPT, pages 506-522, 2004.
-
(2004)
EUROCRYPT
, pp. 506-522
-
-
Boneh, D.1
Crescenzo, G.2
Ostrovsky, R.3
Persiano, G.4
-
8
-
-
33751035759
-
Single Database Private Information Retrieval with Logarithmic Communication
-
Y. C. Chang. Single Database Private Information Retrieval with Logarithmic Communication. In ACISP, 2004.
-
(2004)
ACISP
-
-
Chang, Y.C.1
-
9
-
-
1642602228
-
Computationally Private Information Retrieval with Polylogarithmic Communication
-
J. Stern, editor, Advances in Cryptology, EUROCRYPT '99, Springer, Berlin
-
C. Cachin, S. Micali, and M. Stadler. Computationally Private Information Retrieval with Polylogarithmic Communication. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, pages 402-414. LNCS 1592. Springer, Berlin, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
10
-
-
0003701129
-
Private Information Retrieval by Keywords. Technical Report TR CS0917, Department of Computer Science
-
B. Chor, N. Gilboa, and M. Naor. Private Information Retrieval by Keywords. Technical Report TR CS0917, Department of Computer Science, Technion, 1998.
-
(1998)
Technion
-
-
Chor, B.1
Gilboa, N.2
Naor, M.3
-
11
-
-
0029541045
-
Private Information Retrieval
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private Information Retrieval. In Prve. 36th Annu. IEEE Symp. on Foundations of Computer Science, pages 41-51, 1995.
-
(1995)
Prve. 36th Annu. IEEE Symp. on Foundations of Computer Science
, pp. 41-51
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
12
-
-
36749094148
-
Journal version
-
Journal version: J. ACM, 45:965-981, 1998.
-
(1998)
J. ACM
, vol.45
, pp. 965-981
-
-
-
13
-
-
0002908662
-
A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
I. Damgård and M. Jurik. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In Public Key Cryptography (PKC 2001).
-
(2001)
Public Key Cryptography (PKC
-
-
Damgård, I.1
Jurik, M.2
-
14
-
-
36749037915
-
Improving the Decoding Efficiency of Private Search
-
G. Danezis and C. Diaz Improving the Decoding Efficiency of Private Search. IACR Eprint archive number 024, 2006.
-
(2006)
IACR Eprint archive
, Issue.24
-
-
Danezis, G.1
Diaz, C.2
-
16
-
-
0002302934
-
On the Size of Seperarting Systems and Families of Perfect Hash Functions
-
March
-
M. Fredman and J. Komlós. On the Size of Seperarting Systems and Families of Perfect Hash Functions. SIAM J. Algebraic Discrete Methods, 5(1):61-68, March 1984.
-
(1984)
SIAM J. Algebraic Discrete Methods
, vol.5
, Issue.1
, pp. 61-68
-
-
Fredman, M.1
Komlós, J.2
-
17
-
-
36749004462
-
-
M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. To appear in Proc. 2nd Theory of Cryptography Conference (TCC '05) Cambridge, MA, Feb. 2005.
-
M. Freedman, Y. Ishai, B. Pinkas, and O. Reingold. Keyword Search and Oblivious Pseudorandom Functions. To appear in Proc. 2nd Theory of Cryptography Conference (TCC '05) Cambridge, MA, Feb. 2005.
-
-
-
-
19
-
-
0002171821
-
Tail Bounds for Occupancy and the Satisfiability Threshold Conjecture
-
A. Kamath, R. Motwani, K. Palem, and P. Spirakis. Tail Bounds for Occupancy and the Satisfiability Threshold Conjecture. Random Structures Algorithms, 7:59-80, 1995.
-
(1995)
Random Structures Algorithms
, vol.7
, pp. 59-80
-
-
Kamath, A.1
Motwani, R.2
Palem, K.3
Spirakis, P.4
-
20
-
-
1942420748
-
-
K. Kurosawa and W. Ogata. Oblivious Keyword Search. J. Complexity, 20(2-3):356-371, April/June 2004. Special issue on coding and cryptography.
-
K. Kurosawa and W. Ogata. Oblivious Keyword Search. J. Complexity, 20(2-3):356-371, April/June 2004. Special issue on coding and cryptography.
-
-
-
-
22
-
-
36749036810
-
-
E. Kushilevitz and R. Ostrovsky. One-way Trapdoor Permutations Are Sufficient for Non-Trivial Single-Database Computationally-Private Information Retrieval. In Proc. EUROCRYPT '00, 2000.
-
E. Kushilevitz and R. Ostrovsky. One-way Trapdoor Permutations Are Sufficient for Non-Trivial Single-Database Computationally-Private Information Retrieval. In Proc. EUROCRYPT '00, 2000.
-
-
-
-
23
-
-
36749052425
-
-
H. Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. IACR ePrint Cryptology Archive 2004/063.
-
H. Lipmaa. An Oblivious Transfer Protocol with Log-Squared Communication. IACR ePrint Cryptology Archive 2004/063.
-
-
-
-
25
-
-
0032669864
-
Oblivious Transfer and Polynomial Evaluation
-
M. Naor and B. Pinkas. Oblivious Transfer and Polynomial Evaluation. Proc. 31st STOC, pages 245-254, 1999.
-
(1999)
Proc. 31st STOC
, pp. 245-254
-
-
Naor, M.1
Pinkas, B.2
-
26
-
-
40249101339
-
Algebraic Lower Bounds for Computing on Encrypted Data
-
Manuscript
-
R. Ostrovsky and W. Skeith. Algebraic Lower Bounds for Computing on Encrypted Data. Manuscript, 2006.
-
(2006)
-
-
Ostrovsky, R.1
Skeith, W.2
-
27
-
-
84942550998
-
Public Key Cryptosystems Based on Composite Degree Residue Classes
-
Advances in Cryptology, EUROCRYPT '99, Springer-Verlag, Berlin
-
P. Paillier. Public Key Cryptosystems Based on Composite Degree Residue Classes. In Advances in Cryptology - EUROCRYPT '99, pages 223-238. LNCS 1592. Springer-Verlag, Berlin, 1999.
-
(1999)
LNCS
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
28
-
-
0033309271
-
Non-Interactive CryptoComputing For NC1
-
T. Sander, A. Young, and M. Yung. Non-Interactive CryptoComputing For NC1. In Proc. FOCS, pages 554-567, 1999.
-
(1999)
Proc. FOCS
, pp. 554-567
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
29
-
-
22444454758
-
A New and Efficient All or Nothing Disclosure of Secrets Protocol
-
Springer-Verlag, Berlin
-
J. P. Stern. A New and Efficient All or Nothing Disclosure of Secrets Protocol. In Proc. Asiacrypt. Springer-Verlag, Berlin, 1998.
-
(1998)
Proc. Asiacrypt
-
-
Stern, J.P.1
|