Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
44
views
10
references
Top references
cited by
17
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,454
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Automata, Languages and Programming
Single-Database Private Information Retrieval with Constant Communication Rate
other
Author(s):
Craig Gentry
,
Zulfikar Ramzan
Publication date
(Print):
2005
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Nanopublications (single, attributable and machine-readable assertions in scientific literature)
Most cited references
10
Record
: found
Abstract
: not found
Article
: not found
Private information retrieval
Benny Chor
,
Eyal Kushilevitz
,
Oded Goldreich
…
(1998)
0
comments
Cited
126
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Computationally Private Information Retrieval with Polylogarithmic Communication
Christian Cachin
,
Silvio Micali
,
Markus Stadler
(1999)
0
comments
Cited
67
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Oblivious transfer and polynomial evaluation
Benny Pinkas
,
Moni Naor
(1999)
0
comments
Cited
53
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2005
Pages
: 803-815
DOI:
10.1007/11523468_65
SO-VID:
fe644bcd-5510-4082-9718-4fd8dd07ae4f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 16
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic
pp. 791
Boneh-Franklin Identity Based Encryption Revisited
pp. 956
Approximating Max kCSP – Outperforming a Random Assignment with Almost a Linear Factor
pp. 153
Computational Bounds on Hierarchical Data Processing with Applications to Information Security
pp. 191
Measure and Conquer: Domination – A Case Study
pp. 249
Replacement Paths and k Simple Shortest Paths in Unweighted Directed Graphs
pp. 261
Deterministic Constructions of Approximate Distance Oracles and Spanners
pp. 347
On the Wake-Up Problem in Radio Networks
pp. 513
Weighted Automata and Weighted Logics
pp. 589
Simulated Annealing Beats Metropolis in Combinatorial Optimization
pp. 627
Reordering Buffer Management for Non-uniform Cost Models
pp. 677
On the Cover Time of Random Geometric Graphs
pp. 779
Completely Non-malleable Schemes
pp. 803
Single-Database Private Information Retrieval with Constant Communication Rate
pp. 878
The Complexity of Stochastic Rabin and Streett Games
pp. 1018
An Accessible Approach to Behavioural Pseudometrics
pp. 1043
A Better Approximation Ratio for the Vertex Cover Problem
pp. 1089
Decidability and Complexity Results for Timed Automata via Channel Machines
pp. 1102
Congruences for Visibly Pushdown Languages
pp. 1115
Approximation Algorithms for Euclidean Group TSP
pp. 1202
A Fully Abstract Encoding of the π-Calculus with Data Terms
pp. 1349
The Polyranking Principle
pp. 1450
Unsafe Grammars and Panic Automata
Similar content
1,454
Treatment and prevention of malaria in pregnancy in the private health sector in Uganda: implications for patient safety
Authors:
Anthony Mbonye
,
Esther Buregyeya
,
Elizeus Rutebemberwa
…
Health-Care-Seeking Patterns in the Emerging Private Sector in Burkina Faso: A Population-Based Study of Urban Adult Residents in Ouagadougou
Authors:
Idrissa Beogo
,
Chieh-Yu Liu
,
Yiing-Jenq Chou
…
Solution of the discrete Wheeler-DeWitt equation in the vicinity of small scale factors and quantum mechanics in the space of negative constant curvature
Authors:
S. Cherkas
,
V. L. Kalashnikov
See all similar
Cited by
17
Private Information Retrieval for Coded Storage
Authors:
Terence Chan
,
Siu-Wai Ho
,
Hirosuke Yamamoto
Function Secret Sharing
Authors:
Elette Boyle
,
Niv Gilboa
,
Yuval Ishai
Distributed Point Functions and Their Applications
Authors:
Niv Gilboa
,
Yuval Ishai
See all cited by