Sciweavers

129 search results - page 1 / 26
» Symmetrically Private Information Retrieval
Sort
View
IWSEC
2007
Springer
13 years 11 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
INDOCRYPT
2000
Springer
13 years 9 months ago
Symmetrically Private Information Retrieval
Sanjeev Kumar Mishra, Palash Sarkar
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
13 years 11 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin
JOC
2007
93views more  JOC 2007»
13 years 5 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
14 years 3 days ago
Secure Hamming Distance Based Computation and Its Applications
Abstract. This paper examines secure two-party computation of functions which depend only on the Hamming distance of the inputs of the two parties. We present efficient protocols f...
Ayman Jarrous, Benny Pinkas