Automata, Languages and Programming

From MaRDI portal
Publication:5716829

DOI10.1007/11523468zbMath1084.68043OpenAlexW2940595899WikidataQ56656999 ScholiaQ56656999MaRDI QIDQ5716829

Zulfikar Ramzan, Craig Gentry

Publication date: 10 January 2006

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11523468




Related Items (35)

On the privacy of a code-based single-server computational PIR schemeSQL on structurally-encrypted databasesPuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeSingle-server private information retrieval with sublinear amortized timeOptimal single-server private information retrievalLower bounds for (batch) PIR with private preprocessingPrivacy-enhanced attribute-based private information retrievalDecoy-state quantum private query protocol with two-way communicationCuckoo hashing in cryptography: optimal parameters, robustness and applicationsPrivate join and compute from PIR with defaultA proposal for device independent probabilistic quantum oblivious transferThe hunting of the SNARK\textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDHImproved and formal proposal for device-independent quantum private query *Somewhere statistical soundness, post-quantum security, and SNARGsSimple and efficient two-server ORAMNew Communication-Efficient Oblivious Transfer Protocols Based on PairingsПротокол конфиденциального получения информацииImproved Cryptanalysis of the Multi-Prime φ - Hiding AssumptionOptimal security proofs for full domain hash. RevisitedConstraining Pseudorandom Functions PrivatelyAsymptotically Tight Bounds for Composing ORAM with PIROn the Validity of the Φ-Hiding Assumption in Cryptographic ProtocolsA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn Basing Private Information Retrieval on NP-HardnessPrivate Information Retrieval with Preprocessing Based on the Approximate GCD ProblemCommunication-Efficient Private Protocols for Longest Common SubsequencePrivate multiparty sampling and approximation of vector combinationsMinicrypt primitives with algebraic structure and applicationsVerifiable single-server private information retrieval from LWE with binary errorsPrivate information retrieval with sublinear online timeAnother Look at Extended Private Information Retrieval ProtocolsA Simpler Rate-Optimal CPIR ProtocolFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsSome Open Problems in Information-Theoretic Cryptography




This page was built for publication: Automata, Languages and Programming