메뉴 건너뛰기




Volumn , Issue , 2007, Pages

On the Computational Practicality of Private Information Retrieval

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER HARDWARE; DISTRIBUTED COMPUTER SYSTEMS; INFORMATION RETRIEVAL;

EID: 85141026002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (131)

References (73)
  • 2
    • 85180536036 scopus 로고    scopus 로고
    • Online at
    • Intel and Ethernet. Online at http://www.intel.com/standards/case/case ethernet.htm.
    • Intel and Ethernet
  • 3
    • 85180535272 scopus 로고    scopus 로고
    • Intel Corporation. Online at
    • Intel Corporation. Online at http://www.intel.com.
  • 4
    • 85180538315 scopus 로고    scopus 로고
    • Online at
    • Introduction to DSL. Online at http://www.informit.com/articles/article.asp?p= 31699&seqNum=3&rl=1.
    • Introduction to DSL
  • 5
    • 85180536345 scopus 로고    scopus 로고
    • Motorola. Online at
    • Motorola. Online at http://www.motorola.com.
  • 7
    • 84862323270 scopus 로고    scopus 로고
    • Online at
    • RSA Factoring Challenge. Online at www.rsasecurity.com/rsalabs/challenges/ factoring/.
    • RSA Factoring Challenge
  • 8
    • 85180540240 scopus 로고    scopus 로고
    • RSA Labs. Online at
    • RSA Labs. Online at http://www.rsasecurity.com/rsalabs.
  • 9
    • 33847249399 scopus 로고    scopus 로고
    • Online at
    • TWIRL and RSA Key Size. Online at http://www.rsasecurity.com/rsalabs/node. asp?id=2004.
    • TWIRL and RSA Key Size
  • 11
    • 85180527379 scopus 로고
    • Summer Online at 1995
    • RSA CryptoBytes, Summer 1995. Online at ftp://ftp.rsasecurity.com/pub/cryptobytes/ crypto1n2.pdf, 1995.
    • (1995) RSA CryptoBytes
  • 15
    • 85011102358 scopus 로고    scopus 로고
    • Online at
    • IBM Cryptographic Hardware. Online at http://www-03.ibm.com/security/products/, 2006.
    • (2006) IBM Cryptographic Hardware
  • 20
    • 84974593790 scopus 로고    scopus 로고
    • Reducing the servers computation in private information retrieval: PIR with pre-processing
    • A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers computation in private information retrieval: PIR with pre-processing. Lecture Notes in Computer Science, 1880:55–?, 2000.
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 55
    • Beimel, A.1    Ishai, Y.2    Malkin, T.3
  • 24
    • 1642602228 scopus 로고    scopus 로고
    • Private Information Retrieval with Polylogarithmic Communication
    • Springer-Verlag
    • C. Cachin, S. Micali, and M. Stadler. Private Information Retrieval with Polylogarithmic Communication. In Proceedings of Eurocrypt, pages 402–414. Springer-Verlag, 1999.
    • (1999) Proceedings of Eurocrypt , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.3
  • 35
    • 84937574654 scopus 로고    scopus 로고
    • A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication
    • Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval or how to achieve information theoretic PIR avoiding database replication. Lecture Notes in Computer Science, 1518:200–?, 1998.
    • (1998) Lecture Notes in Computer Science , vol.1518 , pp. 200
    • Gertner, Y.1    Goldwasser, S.2    Malkin, T.3
  • 38
    • 85180530546 scopus 로고    scopus 로고
    • Hothardware.com. Online at
    • Hothardware.com. Pentium 4 670 3.8GHz Performance Profile. Online at http://www.hothardware.com/viewarticle.aspx?articleid=686.
    • Pentium 4 670 3.8GHz Performance Profile
  • 39
    • 17444392883 scopus 로고    scopus 로고
    • Protecting client privacy with trusted computing at the server
    • A. Iliev and S. W. Smith. Protecting client privacy with trusted computing at the server. IEEE Security and Privacy, 3(2):20–28, 2005.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.2 , pp. 20-28
    • Iliev, A.1    Smith, S. W.2
  • 41
    • 85180538036 scopus 로고    scopus 로고
    • Intel. Online at May
    • Intel. Intel Multi-Core Processing. Online at http://www.intel.com/cd/ids/developer/asmo-na/eng/strategy/multicore/index.htm, May 2006.
    • (2006) Intel Multi-Core Processing
  • 42
    • 34247630324 scopus 로고    scopus 로고
    • Intel Circuit Research Labs. Online at
    • Intel Circuit Research Labs. Gigascale Integration-Challenges and Opportunities. Online at http://www.intel.com/cd/ids/developer/ asmo-na/eng/182440.htm.
    • Gigascale Integration-Challenges and Opportunities
  • 43
    • 84876648716 scopus 로고    scopus 로고
    • Intel Corporation. Online at
    • Intel Corporation. Intel Pentium 4 Processor. Online at http://www.intel.com/products/processor/ pentium4.
    • Intel Pentium 4 Processor
  • 46
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: single database, computationally-private information retrieval
    • IEEE Computer Society
    • E. Kushilevitz and R. Ostrovsky. Replication is not needed: single database, computationally-private information retrieval. In Proceedings of FOCS. IEEE Computer Society, 1997.
    • (1997) Proceedings of FOCS
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 47
    • 23044519068 scopus 로고    scopus 로고
    • One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval
    • E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. In Proceedings of EUROCRYPT, 2000.
    • (2000) Proceedings of EUROCRYPT
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 49
    • 26444579536 scopus 로고    scopus 로고
    • An oblivious transfer protocol with log-squared communication
    • H. Lipmaa. An oblivious transfer protocol with log-squared communication. Cryptology ePrint Archive, 2004.
    • (2004) Cryptology ePrint Archive
    • Lipmaa, H.1
  • 53
    • 85180540795 scopus 로고    scopus 로고
    • MobilityGuru.com. Online at
    • MobilityGuru.com. The First Pentium-M Notebook Put To The Test. Online at http://www.mobilityguru.com/2003/02/05/the first pentium/page10. html.
    • The First Pentium-M Notebook Put To The Test
  • 54
    • 84966243285 scopus 로고
    • Modular Multiplication without Trial Division
    • P. Montgomery. Modular Multiplication without Trial Division. Mathematics of Computation, 44(170):519–521, 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.1
  • 55
    • 0000793139 scopus 로고
    • Cramming more components onto integrated circuits
    • April
    • G. Moore. Cramming more components onto integrated circuits. Electronics Magazine, April 1965.
    • (1965) Electronics Magazine
    • Moore, G.1
  • 58
    • 85180540124 scopus 로고    scopus 로고
    • N. I. of Standards and T. (NIST). Online at Aug
    • N. I. of Standards and T. (NIST). The key management guideline. Online at http://csrc.nist.gov/CryptoToolkit/tkkeymgmt.html, Aug. 2005.
    • (2005) The key management guideline
  • 59
    • 0000277371 scopus 로고    scopus 로고
    • Public-key cryptosystems based on composite degree residuosity classes
    • P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of EuroCrypt, 1999.
    • (1999) Proceedings of EuroCrypt
    • Paillier, P.1
  • 66
    • 20444451186 scopus 로고    scopus 로고
    • New lattice based cryptographic constructions
    • O. Regev. New lattice based cryptographic constructions. Journal of the ACM, 51(6):899–942, 2004.
    • (2004) Journal of the ACM , vol.51 , Issue.6 , pp. 899-942
    • Regev, O.1
  • 68
    • 85008047433 scopus 로고    scopus 로고
    • Exposing the Mythical MIPS Year
    • R. D. Silverman. Exposing the Mythical MIPS Year. Computer, 32(8):22–26, 1999.
    • (1999) Computer , vol.32 , Issue.8 , pp. 22-26
    • Silverman, R. D.1
  • 69
    • 0034809926 scopus 로고    scopus 로고
    • Practical server privacy with secure coprocessors
    • S. W. Smith and D. Safford. Practical server privacy with secure coprocessors. IBM Systems Journal, 40(3):683–695, 2001.
    • (2001) IBM Systems Journal , vol.40 , Issue.3 , pp. 683-695
    • Smith, S. W.1    Safford, D.2
  • 71
    • 84947772655 scopus 로고    scopus 로고
    • A new and efficient all-or-nothing disclosure of secrets protocol
    • J. Stern. A new and efficient all-or-nothing disclosure of secrets protocol. In Proceedings of Asia Crypt, pages 357–371, 1998.
    • (1998) Proceedings of Asia Crypt , pp. 357-371
    • Stern, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.