Author:
Li Shuaishuai,Zhang Cong,Lin Dongdai
Publisher
Springer Nature Singapore
Reference25 articles.
1. Ali, A., et al.: Communication-computation trade-offs in PIR. In: USENIX Security 2021 (2021). https://www.usenix.org/conference/usenixsecurity21/presentation/ali
2. Angel, S., Chen, H., Laine, K., Setty, S.T.V.: PIR with compressed queries and amortized query processing. In: 2018 IEEE Symposium on Security and Privacy, SP 2018, Proceedings, San Francisco, California, USA, 21–23 May 2018, pp. 962–979. IEEE Computer Society (2018). https://doi.org/10.1109/SP.2018.00062
3. Lecture Notes in Computer Science;G Brassard,1987
4. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: 42nd Annual Symposium on Foundations of Computer Science, FOCS 2001, Las Vegas, Nevada, USA, 14–17 October 2001, pp. 136–145. IEEE Computer Society (2001). https://doi.org/10.1109/SFCS.2001.959888
5. Lecture Notes in Computer Science;R Canetti,2003
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Receiver Efficient Location-Based Service Scheme by OT Using PKE;2024 International Conference on Intelligent Systems for Cybersecurity (ISCS);2024-05-03