-
1
-
-
55849130742
-
High-Speed Private Information Retrieval Computation on GPU
-
Aguilar Melchor, C., Crespin, B., Gaborit, P., Jolivet, V., Rousseau, P.: High-Speed Private Information Retrieval Computation on GPU. In: SECURWARE 2008, pp. 263-272 (2008)
-
(2008)
SECURWARE 2008
, pp. 263-272
-
-
Aguilar Melchor, C.1
Crespin, B.2
Gaborit, P.3
Jolivet, V.4
Rousseau, P.5
-
2
-
-
84921020129
-
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
-
July
-
Aguilar-Melchor, C., Gaborit, P.: A Lattice-Based Computationally- Efficient Private Information Retrieval Protocol. In: WEWORC 2007 (July 2007)
-
(2007)
WEWORC 2007
-
-
Aguilar-Melchor, C.1
Gaborit, P.2
-
3
-
-
70349126126
-
Querying Databases Privately
-
Springer, Heidelberg
-
Asonov, D. (ed.): Querying Databases Privately. LNCS, vol. 3128. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3128
-
-
Asonov, D.1
-
4
-
-
4344573261
-
Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing
-
Beimel, A., Ishai, Y., Malkin, T.: Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. J. Cryptol. 17(2), 125-151 (2004)
-
(2004)
J. Cryptol.
, vol.17
, Issue.2
, pp. 125-151
-
-
Beimel, A.1
Ishai, Y.2
Malkin, T.3
-
5
-
-
38049138213
-
Public Key Encryption that Allows PIR Queries
-
Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
-
Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption that Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4622
, pp. 50-67
-
-
Boneh, D.1
Kushilevitz, E.2
Ostrovsky, R.3
Skeith III, W.E.4
-
6
-
-
1642602228
-
Computationally Private Information Retrieval with Polylogarithmic Communication
-
Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
-
Cachin, C., Micali, S., Stadler, M.A.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.A.3
-
7
-
-
0029541045
-
Private Information Retrieval
-
October
-
Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: FOCS 1995: Proceedings of the 36th Annual Symposium on the Foundations of Computer Science, pp. 41-50 (October 1995)
-
(1995)
FOCS 1995: Proceedings of the 36th Annual Symposium on the Foundations of Computer Science
, pp. 41-50
-
-
Chor, B.1
Goldreich, O.2
Kushilevitz, E.3
Sudan, M.4
-
8
-
-
0030645563
-
Computationally Private Information Retrieval
-
extended abstract
-
Chor, B., Gilboa, N.: Computationally Private Information Retrieval (extended abstract). In: STOC 1997, pp. 304-313 (1997)
-
(1997)
STOC 1997
, pp. 304-313
-
-
Chor, B.1
Gilboa, N.2
-
9
-
-
0037810717
-
Mixminion: Design of a Type III Anonymous Remailer Protocol
-
May
-
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE S&P, pp. 2-15 (May 2003)
-
(2003)
IEEE S&P
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
10
-
-
84857084061
-
Towards Practical Private Information Retrieval. Achieving Practical Private Information Retrieval Panel
-
August
-
Di Crescenzo, G., et al.: Towards Practical Private Information Retrieval. Achieving Practical Private Information Retrieval Panel. In: SecureComm 2006 (August 2006), http://www.cs.sunysb.edu/ sion/research/PIR. Panel.Securecomm.2006/giovanni.pdf
-
(2006)
SecureComm 2006
-
-
Di Crescenzo, G.1
-
12
-
-
26444512068
-
Single-database private information retrieval with constant communication rate
-
Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005. Proceedings
-
Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803-815. Springer, Heidelberg (2005) (Pubitemid 41436148)
-
(2005)
Lecture Notes in Computer Science
, vol.3580
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
13
-
-
0031624875
-
Protecting Data Privacy in Private Information Retrieval Schemes
-
Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting Data Privacy in Private Information Retrieval Schemes. In: STOC 1998, pp. 151-160 (1998)
-
(1998)
STOC 1998
, pp. 151-160
-
-
Gertner, Y.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
14
-
-
57149129292
-
Private Queries in Location Based Services: Anonymizers are not Necessary
-
Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private Queries in Location Based Services: Anonymizers are not Necessary. In: SIGMOD 2008, pp. 121-132 (2008)
-
(2008)
SIGMOD 2008
, pp. 121-132
-
-
Ghinita, G.1
Kalnis, P.2
Khoshgozaran, A.3
Shahabi, C.4
Tan, K.L.5
-
18
-
-
84937572541
-
Targeted Advertising... And Privacy Too
-
Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
-
Juels, A.: Targeted Advertising... And Privacy Too. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 408-424. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2020
, pp. 408-424
-
-
Juels, A.1
-
19
-
-
0031378815
-
Replication is not needed: Single database, computationally-private information retrieval
-
Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS 1997, p. 364 (1997)
-
(1997)
FOCS 1997
, pp. 364
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
20
-
-
33645970169
-
An Oblivious Transfer Protocol with Log-Squared Communication
-
Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
-
Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
21
-
-
0000793139
-
Cramming More Components onto Integrated Circuits
-
Moore, G.E.: Cramming More Components Onto Integrated Circuits. Electronics Magazine 38(8) (1965)
-
(1965)
Electronics Magazine
, vol.38
, Issue.8
-
-
Moore, G.E.1
-
22
-
-
84857083443
-
-
National Institute of Standards and Technology: Key Management Guideline (2007), http://csrc.nist.gov/groups/ST/toolkit/index.html
-
(2007)
Key Management Guideline
-
-
-
24
-
-
77955434225
-
Privacy-Preserving Queries over Relational Databases
-
Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
-
Olumofin, F., Goldberg, I.: Privacy-Preserving Queries over Relational Databases. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 75-92. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6205
, pp. 75-92
-
-
Olumofin, F.1
Goldberg, I.2
-
25
-
-
84857086252
-
-
Tech. rep., CACR 2010-17, University of Waterloo
-
Olumofin, F., Goldberg, I.: Revisiting the Computational Practicality of Private Information Retrieval. Tech. rep., CACR 2010-17, University of Waterloo (2010), http://www.cacr.math.uwaterloo.ca/techreports/2010/cacr2010-17.pdf
-
(2010)
Revisiting the Computational Practicality of Private Information Retrieval
-
-
Olumofin, F.1
Goldberg, I.2
-
27
-
-
0018545449
-
How to Share a Secret
-
Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
28
-
-
85141026002
-
On the Computational Practicality of Private Information Retrieval
-
Sion, R., Carbunar, B.: On the Computational Practicality of Private Information Retrieval. In: NDSS 2007 (2007)
-
(2007)
NDSS 2007
-
-
Sion, R.1
Carbunar, B.2
-
30
-
-
84857089190
-
Dhrystone Benchmark: History, Analysis, Scores and Recommendations
-
Weiss, A.R.: Dhrystone Benchmark: History, Analysis, Scores and Recommendations. EEMBC White Paper (2002)
-
(2002)
EEMBC White Paper
-
-
Weiss, A.R.1
-
31
-
-
39049099966
-
Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography
-
July
-
Wieschebrink, C.: Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography. In: ISIT 2006, pp. 1733-1737 (July 2006)
-
(2006)
ISIT 2006
, pp. 1733-1737
-
-
Wieschebrink, C.1
-
32
-
-
77951133304
-
The Practicality, H.: Of the Keyword Search Using PIR
-
December
-
Yoshida, R., Shigetomi, Y.C., Imai, R., The Practicality, H.: of the Keyword Search Using PIR. In: ISITA 2008, pp. 1-6 (December 2008)
-
(2008)
ISITA 2008
, pp. 1-6
-
-
Yoshida, R.1
Shigetomi, Y.C.2
Imai, R.3
|