Robust Information-Theoretic Private Information Retrieval (English)
- New search for: Beimel, Amos
- New search for: Stahl, Yoav
- New search for: Cimato, Stelvio
- New search for: Persiano, Giuseppe
- New search for: Galdi, Clemente
- New search for: Beimel, Amos
- New search for: Stahl, Yoav
In:
Security in Communication Networks
: Third International Conference, SCN 2002 Amalfi, Italy, September 11–13, 2002 Revised Papers
;
Chapter: 24
;
326-341
;
2003
- Article/Chapter (Book) / Electronic Resource
-
Title:Robust Information-Theoretic Private Information Retrieval
-
Contributors:Cimato, Stelvio ( editor ) / Persiano, Giuseppe ( editor ) / Galdi, Clemente ( editor ) / Beimel, Amos ( author ) / Stahl, Yoav ( author )
-
Conference:International Conference on Security in Communication Networks ; 2002 ; Amalfi, Italy
-
Published in:Security in Communication Networks : Third International Conference, SCN 2002 Amalfi, Italy, September 11–13, 2002 Revised Papers ; Chapter: 24 ; 326-341Lecture Notes in Computer Science ; 2576 ; 326-341
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2003-03-14
-
Size:16 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Some Applications of Polynomials for the Design of Cryptographic ProtocolsKushilevitz, Eyal et al. | 2003
- 2
-
Secure Multi-party Computation Made SimpleMaurer, Ueli et al. | 2003
- 3
-
Forward Secrecy in Password-Only Key Exchange ProtocolsKatz, Jonathan / Ostrovsky, Rafail / Yung, Moti et al. | 2003
- 4
-
Weak Forward Security in Mediated RSATsudik, Gene et al. | 2003
- 5
-
On the Power of Claw-Free PermutationsDodis, Yevgeniy / Reyzin, Leonid et al. | 2003
- 6
-
Equivocable and Extractable Commitment SchemesCrescenzo, Giovanni Di et al. | 2003
- 7
-
An Improved Pseudorandom Generator Based on Hardness of FactoringDedić, Nenad / Reyzin, Leonid / Vadhan, Salil et al. | 2003
- 8
-
Intrusion-Resilient Signatures: Generic Constructions, or Defeating Strong Adversary with Minimal AssumptionsItkis, Gene et al. | 2003
- 9
-
Efficient Re-keying Protocols for Multicast EncryptionCrescenzo, Giovanni Di / Kornievskaia, Olga et al. | 2003
- 10
-
On a Class of Key Agreement Protocols Which Cannot Be Unconditionally SecureNiedermeyer, Frank / Schindler, Werner et al. | 2003
- 11
-
A Group Key Distribution Scheme with Decentralised User JoinKurnio, Hartono / Safavi-Naini, Rei / Wang, Huaxiong et al. | 2003
- 12
-
On a Resynchronization Weakness in a Class of Combiners with MemoryBorissov, Yuri / Nikova, ⋆Svetla / Preneel, Bart / Vandewalle, Joos et al. | 2003
- 13
-
On Probability of Success in Linear and Differential CryptanalysisAydin Selçuk, Ali / Biçak, Ali et al. | 2003
- 14
-
Differential Cryptanalysis of a Reduced-Round SEEDYanami, Hitoshi / Shimoyama, Takeshi et al. | 2003
- 15
-
Medical Information Privacy Assurance: Cryptographic and System AspectsAteniese, Giuseppe / Curtmola, Reza / de Medeiros, Breno / Davis, Darren et al. | 2003
- 16
-
A Format-Independent Architecture for Run-Time Integrity Checking of Executable CodeCatuogno, Luigi / Visconti, Ivan et al. | 2003
- 17
-
How to Repair ESIGNGranboulan, Louis et al. | 2003
- 18
-
Forward-Secure Signatures with Fast Key UpdateKozlov, Anton / Reyzin, Leonid et al. | 2003
- 19
-
Constructing Elliptic Curves with Prescribed Embedding DegreesBarreto, Paulo S. L. M. / Lynn, Ben / Scott, Michael et al. | 2003
- 20
-
A Signature Scheme with Efficient ProtocolsCamenisch, Jan / Lysyanskaya, Anna et al. | 2003
- 21
-
Efficient Zero-Knowledge Proofs for Some Practical Graph ProblemsDesmedt, Yvo / Wang, Yongge et al. | 2003
- 22
-
Reduction Zero-KnowledgeDeng, Xiaotie / Lee, C. H. / Zhao, Yunlei / Zhu, Hong et al. | 2003
- 23
-
A New Notion of Soundness in Bare Public-Key ModelCheung, Shirley H. C. / Deng, Xiaotie / Lee, C. H. / Zhao, Yunlei et al. | 2003
- 24
-
Robust Information-Theoretic Private Information RetrievalBeimel, Amos / Stahl, Yoav et al. | 2003
- 25
-
Trading Players for Efficiency in Unconditional Multiparty ComputationPrabhu, B. / Srinathan, K. / Pandu Rangan, C. et al. | 2003
- 26
-
Secret Sharing Schemes on Access Structures with Intersection Number Equal to OneMartí-Farré, Jaume / Padró, Carles et al. | 2003