Evaluating Branching Programs on Encrypted Data
- 16 May 2007
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC
Abstract
No abstract availableKeywords
This publication has 27 references indexed in Scilit:
- Evaluating 2-DNF Formulas on CiphertextsLecture Notes in Computer Science, 2005
- Keyword Search and Oblivious Pseudorandom FunctionsLecture Notes in Computer Science, 2005
- Universal arguments and their applicationsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Priced Oblivious Transfer: How to Sell Digital GoodsLecture Notes in Computer Science, 2001
- Minimal-Latency Secure Function EvaluationLecture Notes in Computer Science, 2000
- One-Round Secure Computation and Secure Autonomous Mobile AgentsLecture Notes in Computer Science, 2000
- Computationally Private Information Retrieval with Polylogarithmic CommunicationLecture Notes in Computer Science, 1999
- Private information retrievalJournal of the ACM, 1998
- Noninteractive Zero-KnowledgeSIAM Journal on Computing, 1991
- A randomized protocol for signing contractsCommunications of the ACM, 1985