skip to main content
10.1145/277697.277713acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article
Free Access

Universal service-providers for database private information retrieval (extended abstract)

Authors Info & Claims
Published:01 June 1998Publication History
First page image

References

  1. 1.A. Ambainis. Upper bound on the communication complexity of private information retrieval. In Proc. of 2,1th ICALP, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.D. Beaver. Commodity-based cryptography. In Proc. of 29~h $TOC, pages 446-455, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In $TA C$, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Proc. of CRYPTO, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th $TOC, pages 1-10, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.D. Chaum, C. Cr~peau, and I. Damg&rd. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.B. Chor and N. Gilboa. Computationally private information retrieval. In Proc. of 29th $TOC, pages 304-313, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of 36th FOC$, pages 41-50, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Y. Gertner, Y. ishai, , E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. of 30th $TOC, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.O. Goldreich. On the foundations of modern cryptography. In Proc. of CRYPTO'97, pages 46-74, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game (extended abstract). In Proc. of 19th $TOC, pages 218-229, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.S. Goldwasser. Multi-party computations: Past and present. In Proc. of 16th PODC, pages 1-6, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.S. Goldwasser. New directions in cryptography: Twenty some years later, in Proc. of 38th FOES, pages 314-324, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.S. Goldwasser and S. Micali. Probabilistic encryption. Journal of computer and systems sciences, 28:270-299, 1984.Google ScholarGoogle ScholarCross RefCross Ref
  15. 15.E. Kushilevitz and R. Ostrovsky. Single-database computationally private information retrieval. In Proc. of 38th FOC$, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.F.J. Macwilliams and N.J. Sloane. The theory of error correcting codes. North Holland, 1978.Google ScholarGoogle Scholar
  17. 17.E. Man. Personal communication, 1997.Google ScholarGoogle Scholar
  18. 18.J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. In Proc. of 22th $TOC, pages 213-223, 1990. Journal version to appear in Siam Journal on Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. 19.R. Ostrovsky and V. Shoup. Private information storage. In Proc. of ~9th $TOC, pages 294-303, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. 20.A.C. Yao. Protocols for secure computations (extended abstract). In Proc. of 23rd FOC$, pages 160-164, 1982.Google ScholarGoogle Scholar

Index Terms

  1. Universal service-providers for database private information retrieval (extended abstract)

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Conferences
                      PODC '98: Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
                      June 1998
                      334 pages
                      ISBN:0897919777
                      DOI:10.1145/277697

                      Copyright © 1998 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 1 June 1998

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • Article

                      Acceptance Rates

                      Overall Acceptance Rate740of2,477submissions,30%

                      Upcoming Conference

                      PODC '24

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader