Private information retrieval

Results: 78



#Item
71Applied mathematics / Coding theory / Mathematics / Private information retrieval / Finite fields / Computational complexity theory / Oblivious transfer / Locally decodable code / Information retrieval / Theoretical computer science / Cryptographic protocols / Error detection and correction

contributed articles Cryptographic protocols safeguard the privacy of user queries to public databases.

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2010-11-09 13:29:34
72Mathematics / Information / Locally decodable code / Reed–Muller code / Hadamard code / Forward error correction / Code / Private information retrieval / Noisy-channel coding theorem / Error detection and correction / Coding theory / Discrete mathematics

Foundations and Trends R in sample Vol. xx, No xx (xxxx) 1–114

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-03-05 19:53:10
73Locally decodable code / Information / Private information retrieval / Data / Forward error correction / Hadamard code / Information retrieval / Walsh–Hadamard code / List decoding / Error detection and correction / Coding theory / Mathematics

Locally Decodable Codes Sergey Yekhanin Microsoft Research Silicon Valley

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2012-01-23 12:03:07
74Private information retrieval / Electronic commerce / Homomorphic encryption / Oblivious transfer / Paillier cryptosystem / Goldwasser–Micali cryptosystem / Communication complexity / RSA / XTR / Cryptography / Cryptographic protocols / Public-key cryptography

A Survey of Single-Database PIR: Techniques and Applications Rafail Ostrovsky∗

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2007-09-07 16:17:00
75Private information retrieval / Random self-reducibility / Oblivious transfer / Communication complexity / Zero-knowledge proof / IP / Quadratic residue / FO / Cryptography / Theoretical computer science / Cryptographic protocols

Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract)

Add to Reading List

Source URL: www.cs.ucla.edu

Language: English - Date: 2003-09-23 18:58:45
76Private information retrieval / Computational complexity theory / Paillier cryptosystem / Oblivious transfer / Time complexity / XTR / Cryptography / Cryptographic protocols / Public-key cryptography

An Oblivious Transfer Protocol with Log-Squared Communication Helger Lipmaa

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-07-05 16:22:56
77Oblivious transfer / Computing / Communications protocol / Private information retrieval / Transmission Control Protocol / Cryptographic protocols / Data / Information

PDF Document

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-08-14 03:39:40
78Mathematics / Computational complexity theory / Private information retrieval / Binary decision diagram / Communication complexity / Transmission Control Protocol / Oblivious transfer / Theoretical computer science / Cryptographic protocols / Applied mathematics

PDF Document

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-20 11:30:52
UPDATE