<--- Back to Details
First PageDocument Content
Private information retrieval / Electronic commerce / Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Communication complexity / RSA / XTR / Cryptography / Cryptographic protocols / Public-key cryptography
Date: 2007-09-07 16:17:00
Private information retrieval
Electronic commerce
Homomorphic encryption
Oblivious transfer
Paillier cryptosystem
Goldwasser–Micali cryptosystem
Communication complexity
RSA
XTR
Cryptography
Cryptographic protocols
Public-key cryptography

A Survey of Single-Database PIR: Techniques and Applications Rafail Ostrovsky∗

Add to Reading List

Source URL: www.cs.ucla.edu

Download Document from Source Website

File Size: 225,66 KB

Share Document on Facebook

Similar Documents

Cryptography / Post-quantum cryptography / Lattice-based cryptography / Models of computation / Homeomorphisms / Homomorphic encryption / Quantum computing / Lattice / Learning with errors / RSA / One-time pad / Quantum circuit

Quantum FHE (Almost) As Secure as Classical Zvika Brakerski∗ Abstract Fully homomorphic encryption schemes (FHE) allow to apply arbitrary efficient computation to encrypted data without decrypting it first. In Quantum

DocID: 1xTjK - View Document

Toward Automated Analysis and Prototyping of Homomorphic Encryption Schemes Cyrielle FERON Loïc LAGADEC Vianney LAPOTRE

DocID: 1vm3I - View Document

Controlled Homomorphic Encryption: Definition and Construction Yvo Desmedt1 1

DocID: 1vjjZ - View Document

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

DocID: 1vf4f - View Document

A Full RNS Implementation of Fan and Vercauteren Somewhat Homomorphic Encryption Scheme Presented by: Vincent Zucca1 Joint work with: Jean-Claude Bajard1 , Julien Eynard2 and Anwar Hasan2 1 Sorbonne

DocID: 1vaCY - View Document