Fully malicious authenticated PIR
From MaRDI portal
Publication:6653043
DOI10.1007/978-3-031-68400-5_4MaRDI QIDQ6653043
Publication date: 13 December 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Can we access a database both locally and privately?
- Towards doubly efficient private information retrieval
- Verifiable single-server private information retrieval from LWE with binary errors
- Compressible FHE with applications to PIR
- How to correct errors in multi-server PIR
- Verifiable single-server private information retrieval
- Robust information-theoretic private information retrieval
- Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose
- Secure Two-Party Computation via Cut-and-Choose Oblivious Transfer
- Universal Arguments and their Applications
- Verifiable Multi-server Private Information Retrieval
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Simulatable Adaptive Oblivious Transfer
- Information Security
- Verifiable private information retrieval
- Doubly efficient private information retrieval and fully homomorphic RAM computation from ring LWE
- Multi-server PIR with full error detection and limited error correction
This page was built for publication: Fully malicious authenticated PIR
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6653043)