Back to Results
First PageMeta Content
Private information retrieval / Information retrieval / Communications protocol / Computing / Data / Information / Cryptographic protocols


Repudiative Information Retrieval ∗ Johann-Christoph Freytag Dmitri Asonov
Add to Reading List

Document Date: 2005-07-20 02:26:54


Open Document

File Size: 205,92 KB

Share Result on Facebook

City

e(Query / San Francisco / Washington / DC / Berlin / Vienna / /

Company

IBM / Distributed Information Systems / Privacy Enhancing Technologies / Dave Sa / /

Country

Austria / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Humboldt University / Germany Humboldt University / Johann-Christoph Freytag Dmitri Asonov Humboldt University / /

IndustryTerm

tamper proof device / e-commerce / tamper-proof device / basic protocol / potential applications / database server / repudiative information retrieval protocol / dynamic business applications / Web transactions / purposed hardware / pre√ processing complexity / /

NaturalFeature

Shannon / /

Organization

Johann-Christoph Freytag Dmitri Asonov Humboldt University Berlin / T.J. Watson Research Center / Humboldt University Berlin / German Research Society / Graduate School / Germany Humboldt University Berlin / World Congress / /

Person

Stuart G. Stubblebine / Peter Rieger / Steve H. Weingart / Francis Edward Su / Sean W. Smith / Paul F. Syverson / Feng Bao / Silvio Micali / Eyal Kushilevitz / Neil K. Daswani / Claus Peter Schnorr / Dominic J.D. Hughes / George Danezis / Oded Goldreich / Bernhard Thalheim / Claudia Diaz / Joris Claessens / Alison Gibbs / Benny Chor / Vitaly Shmatikov / Mattis Neiling / Dmitri Asonov / Stefaan Seys / Bart Preneel / Markus Stadler / Hans-Joachim Lenz / Markus Jakobsson / Andrei Serjantov / Moni Naor / Robert H. Deng / Cynthia Dwork / Peirong Feng / Rafail Ostrovsky / Christian Cachin / Johann-Christoph Freytag / Elaine R. Palmer / A. PIR PROTOCOLS WITH SECURE COPROCESSOR / Johann-Christoph Freytag Dmitri Asonov / Ronald L. Rivest / /

Position

General / Private Information Retrieval / /

Product

configurable / Psect3 / R1 / PIR / /

ProvinceOrState

Pennsylvania / South Carolina / /

Technology

following PIR protocol / APPENDIX A. PIR PROTOCOLS / proposed RIR protocol / Parametric repudiative information retrieval protocol / 1 pi Algorithm / two protocols / 5.1 Deniable Encryption Encryption / signed elgamal encryption / PIR protocol / Parameter Protocol / encryption / Cryptography / 4.3 When Our RIR Protocol / public key / basic protocol / RIR protocol / PIR protocols / VARYING ROBUSTNESS OF THE RIR PROTOCOL / We present Algorithm / proposed protocol / /

URL

http /

SocialTag