Public Key Encryption That Allows PIR Queries
- 1 January 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- Searchable symmetric encryptionPublished by Association for Computing Machinery (ACM) ,2006
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and ExtensionsLecture Notes in Computer Science, 2005
- Privacy Preserving Keyword Searches on Remote Encrypted DataLecture Notes in Computer Science, 2005
- Single Database Private Information Retrieval with Logarithmic CommunicationLecture Notes in Computer Science, 2004
- Public Key Encryption with Keyword SearchLecture Notes in Computer Science, 2004
- Universal arguments and their applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Universally composable two-party and multi-party secure computationPublished by Association for Computing Machinery (ACM) ,2002
- Computationally Private Information Retrieval with Polylogarithmic CommunicationLecture Notes in Computer Science, 1999
- Private information retrievalJournal of the ACM, 1998
- Space/time trade-offs in hash coding with allowable errorsCommunications of the ACM, 1970