scientific article; zbMATH DE number 1261806

From MaRDI portal
Publication:4231909

zbMath0938.68625MaRDI QIDQ4231909

Oded Goldreich, Eyal Kushilevitz, Madhu Sudan, Benny Chor

Publication date: 26 April 2000


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (74)

On the privacy of a code-based single-server computational PIR schemeSelling multiple secrets to a single buyerSQL on structurally-encrypted databasesNon-interactive batch arguments for NP from standard assumptionsPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeLinear Batch CodesElectronic jury voting protocolsGarbled circuits with sublinear evaluatorSingle-server private information retrieval with sublinear amortized timeBatch-OT with optimal rateUpper bound on the communication complexity of private information retrievalBuilding a dynamic searchable encrypted medical database for multi-clientOn locally decodable codes, self-correctable codes, and \(t\)-private PIRLeveraging linear decryption: rate-1 fully-homomorphic encryption and time-lock puzzlesCompressible FHE with applications to PIRPermuted puzzles and cryptographic hardnessA survey of privacy-preserving mechanisms for heterogeneous data typesSublinear-communication secure multiparty computation does not require FHEAdaptive Oblivious Transfer and GeneralizationOblivious message retrievalQuantum private query based on quantum homomorphic encryption with qubit rotationMulti-user quantum private queryProgrammable distributed point functionsEfficient private set intersection cardinality protocol in the reverse unbalanced settingSublinear secure computation from new assumptionsEnhancing user privacy in SARG04-based private database query protocolsOptimal single-server private information retrievalPrivacy-enhanced attribute-based private information retrievalPrivate join and compute from PIR with defaultExipnos: an efficient verifiable dynamic symmetric searchable encryption scheme with forward and backward privacyA survey on single server private information retrieval in a coding theory perspectiveOptimal possibly nonlinear 3-PIR codes of small sizeA proposal for device independent probabilistic quantum oblivious transferNearest private query based on quantum oblivious key distributionImpossibilities in succinct arguments: black-box extraction and moreQuantum private query with authenticationPrivate Information Retrieval from Coded Databases with Colluding ServersSomewhere statistical soundness, post-quantum security, and SNARGsRandom-index PIR and applicationsCommunication-efficient distributed oblivious transferA new multi-server scheme for private information retrievalSimple and efficient two-server ORAMCooperative private searching in cloudsRestricted adaptive oblivious transferAn Efficient PIR Construction Using Trusted HardwareHypercubes and Private Information RetrievalПротокол конфиденциального получения информацииRobust quantum private queriesA novel quantum solution to secure two-party distance computationGeneral constructions for information-theoretic private information retrievalOptimal configurations for peer-to-peer user-private information retrievalPrivate database queries using one quantum statePrivacy-preserving verifiable delegation of polynomial and matrix functionsCapacity-achieving private information retrieval scheme with a smaller sub-packetizationA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalSecurity improvements of several basic quantum private query protocols with \(O(\log N)\) communication complexityAdaptive oblivious transfer with access control from lattice assumptionsMulti-server verifiable delegation of computations: unconditional security and practical efficiencyMulti-value private information retrieval with colluding databases via trace functionsVerifiable single-server private information retrieval from LWE with binary errorsPrivate information retrieval with sublinear online timeStacked garbling for disjunctive zero-knowledge proofsBreaking the circuit size barrier for secure computation under quasi-polynomial LPNProtecting data privacy in publicly verifiable delegation of matrix and polynomial functionsAnother Look at Extended Private Information Retrieval ProtocolsAn efficient quantum private query protocol based on oracle and Grover iterationA new protocol for quantum private query against joint-measurement attackProtecting data privacy in private information retrieval schemesA general private information retrieval scheme for MDS coded databases with colluding serversFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsPrivate Information Retrieval Using Trusted HardwarePrivacy-Preserving Queries on Encrypted DataQuantum oblivious transfer based on a quantum symmetrically private information retrieval protocolQuantum private comparison with a malicious third party




This page was built for publication: