-
1
-
-
70350676688
-
Another Look at Extended Private Information Retrieval Protocols
-
Preneel, B. (ed.) AFRICACRYPT 2009 Springer, Heidelberg
-
Bringer, J., Chabanne, H.: Another Look at Extended Private Information Retrieval Protocols. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 305-322. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5580
, pp. 305-322
-
-
Bringer, J.1
Chabanne, H.2
-
2
-
-
0025475986
-
Lower Bounds to the Complexity of Symmetric Boolean Functions
-
Babai, L., Pudlák, P., Rödl, V., Szemerédi, E.: Lower Bounds to the Complexity of Symmetric Boolean Functions. Theoretical Computer Science 74(3), 313-323 (1990)
-
(1990)
Theoretical Computer Science
, vol.74
, Issue.3
, pp. 313-323
-
-
Babai, L.1
Pudlák, P.2
Rödl, V.3
Szemerédi, E.4
-
3
-
-
49049118519
-
Fuzzy Private Matching
-
IEEE Computer Society Press, Los Alamitos
-
Chmielewski, Ł., Hoepman, J.-H.: Fuzzy Private Matching. In: The Third International Conference on Availability, Reliability and Security, ARES 2008, Barcelona, Spain, March 4-7, pp. 327-334. IEEE Computer Society Press, Los Alamitos (2008)
-
(2008)
The Third International Conference on Availability, Reliability and Security, ARES 2008, Barcelona, Spain, March 4-7
, pp. 327-334
-
-
Chmielewski, Ł.1
Hoepman, J.-H.2
-
4
-
-
0034782679
-
Selective Private Function Evaluation with Applications to Private Statistics
-
ACM Press, New York
-
Canetti, R., Ishai, Y., Kumar, R., Reiter, M.K., Rubinfeld, R., Wright, R.N.: Selective Private Function Evaluation with Applications to Private Statistics. In: PODC 2001, Newport, Rhode Island, USA, August 26-29, pp. 293-304. ACM Press, New York (2001)
-
(2001)
PODC 2001, Newport, Rhode Island, USA, August 26-29
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
5
-
-
84867553981
-
A Generalisation, A Simplification and Some Applications of Paillier's Probabilistic Public-Key System
-
Kim, K.-c. (ed.) PKC 2001 Springer, Heidelberg
-
Damgård, I., Jurik, M.: A Generalisation, A Simplification And Some Applications of Paillier's Probabilistic Public-Key System. In: Kim, K.-c. (ed.) PKC 2001. LNCS, vol. 1992, pp. 119-136. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
6
-
-
26444512068
-
Single-Database Private Information Retrieval with Constant Communication Rate
-
Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005 Springer, Heidelberg
-
Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803-815. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3580
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
7
-
-
38049046515
-
Evaluating Branching Programs on Encrypted Data
-
Vadhan, S.P. (ed.) TCC 2007 Springer, Heidelberg
-
Ishai, Y., Paskin, A.: Evaluating Branching Programs on Encrypted Data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 575-594. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 575-594
-
-
Ishai, Y.1
Paskin, A.2
-
8
-
-
33745565439
-
Polylogarithmic Private Approximations and Efficient Matching
-
Halevi, S., Rabin, T. (eds.) TCC 2006 Springer, Heidelberg
-
Indyk, P., Woodruff, D.P.: Polylogarithmic Private Approximations and Efficient Matching. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 245- 264. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.3876
, pp. 245-264
-
-
Indyk, P.1
Woodruff, D.P.2
-
9
-
-
33645970169
-
An Oblivious Transfer Protocol with Log-Squared Communication
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005 Springer, Heidelberg
-
Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314- 328. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
10
-
-
78650227109
-
How to Disassemble CPIR: First CPIR with Database-Dependent Computation
-
ICISC 2009, Seoul, Korea, December 2-4 Springer, Heidelberg
-
Lipmaa, H.: How to Disassemble CPIR: First CPIR with Database-Dependent Computation. In: ICISC 2009, Seoul, Korea, December 2-4. LNCS. Springer, Heidelberg (2009)
-
(2009)
LNCS
-
-
Lipmaa, H.1
-
11
-
-
38049016843
-
A New Protocol for Conditional Disclosure of Secrets and Its Applications
-
Katz, J., Yung, M. (eds.) ACNS 2007 Springer, Heidelberg
-
Laur, S., Lipmaa, H.: A New Protocol for Conditional Disclosure of Secrets And Its Applications. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 207-225. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4521
, pp. 207-225
-
-
Laur, S.1
Lipmaa, H.2
-
12
-
-
0031338276
-
Efficient Oblivious Branching Programs for Threshold and Mod Functions
-
Sinha, R.K., Thathachar, J.S.: Efficient Oblivious Branching Programs for Threshold And Mod Functions. Journal of Computer and System Sciences 55(3), 373-384 (1997)
-
(1997)
Journal of Computer and System Sciences
, vol.55
, Issue.3
, pp. 373-384
-
-
Sinha, R.K.1
Thathachar, J.S.2
|