Sciweavers

340 search results - page 11 / 68
» Computationally Private Information Retrieval with Polylogar...
Sort
View
114
Voted
ASIACRYPT
2005
Springer
15 years 5 months ago
Revealing Additional Information in Two-Party Computations
Abstract. A two-argument function is computed privately by two parties if after the computation, no party should know anything about the other inputs except for what he is able to ...
Andreas Jakoby, Maciej Liskiewicz
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
15 years 11 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
88
Voted
CRYPTO
2005
Springer
96views Cryptology» more  CRYPTO 2005»
15 years 5 months ago
Privacy-Preserving Set Operations
In many important applications, a collection of mutually distrustful parties must perform private computation over multisets. Each party’s input to the function is his private i...
Lea Kissner, Dawn Xiaodong Song
81
Voted
FOCS
2000
IEEE
15 years 4 months ago
Private Quantum Channels
Shannon [Sha48, Sha49] in celebrated works had shown that n bits of shared key is necessary and sufficient to transmit n-bit classical information in an information-theoretically ...
Andris Ambainis, Michele Mosca, Alain Tapp, Ronald...