Author:
Canetti Ran,Holmgren Justin,Richelson Silas
Publisher
Springer International Publishing
Reference21 articles.
1. Ajtai, M.: Oblivious rams without cryptographic assumptions. In: STOC, pp. 181–190. ACM (2010)
2. Lecture Notes in Computer Science;A Beimel,2001
3. Beimel, A., Ishai, Y., Malkin, T.: Reducing the servers’ computation in private information retrieval: PIR with preprocessing. J. Cryptol. 17(2), 125–151 (2004)
4. Boyle, E., Ishai, Y., Pass, R., Wootters, M.: Can we access a database both locally and privately? Cryptology ePrint Archive, Report 2017/567 (2017).
http://eprint.iacr.org/2017/567
5. Lecture Notes in Computer Science;D Bleichenbacher,2000
Cited by
39 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献