메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1848-1852

A fast private information retrieval protocol

Author keywords

[No Author keywords available]

Indexed keywords

BIT-OPERATIONS; CODING THEORY; COMMUNICATION PERFORMANCES; COMPUTATIONAL COSTS; COMPUTATIONAL PERFORMANCE; INTERNATIONAL SYMPOSIUM; NP-COMPLETE; ORDERS-OF-MAGNITUDE; PRIVATE INFORMATION RETRIEVAL;

EID: 52349090004     PISSN: 21578101     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISIT.2008.4595308     Document Type: Conference Paper
Times cited : (39)

References (8)
  • 1
    • 39049099966 scopus 로고    scopus 로고
    • Wieschebrink, C.: Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography. In:2006 IEEE International Symposium on Information Theory, (2006) 1733-1737
    • Wieschebrink, C.: Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography. In:2006 IEEE International Symposium on Information Theory, (2006) 1733-1737
  • 2
    • 0031378815 scopus 로고    scopus 로고
    • Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract)
    • Kushilevitz, E., Ostrovsky, R.: Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract). In: FOCS: IEEE Symposium on Foundations of Computer Science (FOCS). (1997) 364-373
    • (1997) FOCS: IEEE Symposium on Foundations of Computer Science (FOCS) , pp. 364-373
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 3
    • 84947772655 scopus 로고    scopus 로고
    • Stern, J.P.: A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. In:13th Annual International Conference on the Theory and Application of Cryptology & Information Security (ASIACRYPT'98), Beijing, China. 1514 of Lecture Notes in Computer Science., Springer (1998) 357-371
    • Stern, J.P.: A New Efficient All-Or-Nothing Disclosure of Secrets Protocol. In:13th Annual International Conference on the Theory and Application of Cryptology & Information Security (ASIACRYPT'98), Beijing, China. Volume 1514 of Lecture Notes in Computer Science., Springer (1998) 357-371
  • 4
    • 33645970169 scopus 로고    scopus 로고
    • Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In:8th Information Security Conference (ISC'05), Singapore, 3650 of Lecture Notes in Computer Science., Springer (2005) 314-328
    • Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In:8th Information Security Conference (ISC'05), Singapore, Volume 3650 of Lecture Notes in Computer Science., Springer (2005) 314-328
  • 5
    • 26444512068 scopus 로고    scopus 로고
    • Single-Database Private Information Retrieval with Constant Communication Rate
    • ICALP'05, Lisbon, Portugal, of, Springer
    • Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate, In: ICALP'05, Lisbon, Portugal, Volume 3580 of Lecture Notes in Computer Science., Springer (2005) 803-815
    • (2005) Lecture Notes in Computer Science , vol.3580 , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2
  • 7
    • 84888035806 scopus 로고    scopus 로고
    • Aguilar Melchor, C., Gaborit, P.: A Lattice-Based Computationally- Efficient Private Information Retrieval Protocol. In: Western European Workshop on Research in Cryptology (WEWoRC'2007), Bochum, Germany. Book of Abstracts, (2007) 50-54, Extended version available on IACR eprints http://eprint.iacr.org/ 2007/446
    • Aguilar Melchor, C., Gaborit, P.: A Lattice-Based Computationally- Efficient Private Information Retrieval Protocol. In: Western European Workshop on Research in Cryptology (WEWoRC'2007), Bochum, Germany. Book of Abstracts, (2007) 50-54, Extended version available on IACR eprints http://eprint.iacr.org/ 2007/446
  • 8
    • 33846867921 scopus 로고    scopus 로고
    • Nguyen and Jacques Stern: The two faces of lattices in cryptology
    • Cryptography and Lattices, International Conference, CaLC, Providence, RI, USA, March 29-30, Revised Papers. of, Springer , 2001
    • Phong Q. Nguyen and Jacques Stern: The two faces of lattices in cryptology. In: Cryptography and Lattices, International Conference, CaLC 2001, Providence, RI, USA, March 29-30, 2001, Revised Papers. Volume 2146 of Lecture Notes in Computer Science., Springer (2001) 146-180
    • (2001) Lecture Notes in Computer Science , vol.2146 , pp. 146-180
    • Phong, Q.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.