Back to Results
First PageMeta Content
Applied mathematics / Coding theory / Mathematics / Private information retrieval / Finite fields / Computational complexity theory / Oblivious transfer / Locally decodable code / Information retrieval / Theoretical computer science / Cryptographic protocols / Error detection and correction


contributed articles Cryptographic protocols safeguard the privacy of user queries to public databases.
Add to Reading List

Document Date: 2010-11-09 13:29:34


Open Document

File Size: 4,44 MB

Share Result on Facebook

City

Barbara / Santa Barbara / Taipei / New York / New Orleans / Portland / Vancouver / Cambridge / Prague / Beijing / Miami / Lisbon / Mountain View / Chicago / Beach / /

Company

ACM Press / SIAM Journal / PIR / Suzuki / Microsoft / /

Country

Italy / Sudan / Portugal / Czech Republic / /

Currency

pence / USD / /

/

Facility

Massachusetts Institute of Technology / University of California / /

IndustryTerm

nformation-theoretic protocols / communications complexity / individual server / Each server / online public databases / computational protocols / absolute guarantee that each server / cryptographic protocols / oblivious transfer protocol / network / typical applications / trivial solution / information-theoretic protocols / /

Organization

University of California / Berkeley / Massachusetts Institute of Technology / IEEE Computer Society / /

Person

Sergey Yekhanin / Locally Decodable / Alex Andoni / Martin Abadi / Kushilevitz / Sumit Nain / /

Position

E. General / researcher / General / author / Private Information Retrieval / /

Product

answer1 answer2 query1 query2 Two-server / answer1 answer2 query1 query2 / /

ProgrammingLanguage

FL / C / /

ProvinceOrState

Saskatchewan / Louisiana / British Columbia / New York / Florida / California / Massachusetts / /

PublishedMedium

Journal of the ACM / SIAM Journal on Computing / Theory of Computing / /

Technology

information-theoretic protocols / oblivious transfer protocol / The protocol / decoding algorithm / pdf / cryptography / nformation-theoretic protocols / contributed articles Cryptographic protocols / /

URL

http /

SocialTag