Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/258533.258606acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Private information storage (extended abstract)

Published: 04 May 1997 Publication History
First page of PDF

References

[1]
M. Abadai, J. Feigenbaum, and J. Kilian. On hiding information from an oracle. JCSS 39(1):21-50, 1989.
[2]
N. Adam and J. Wortmann. Security control methods for statistical databases: a comparative study. ACM Computing Surveys 21(4):515-555, 1989.
[3]
A. Ambainis. Upper bound on the communication complexity of private information retrieval. On-line version published in Theory of Cryptography Library, http://theory.lcs.mit.edu/-tcryptol, May 1996.
[4]
D. Beaver and J. Feigenbaum. Hiding instances in multi-oracle queries. In Proc. of 7th STACS, Springer-Verlag LNC$, Vol.,415, pp. 37-48, 1990.
[5]
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Advances in Cryptology--Proc. Crypto '90, 1990.
[6]
M. Ben-or, S. Goldwasser, J. Kilian and A. Wigderson. Multi prover interactive proofs: How to remove intractability. STOC 88.
[7]
G.R. Blakley. Safeguarding cryptographic keys. In Proc. NCC AFIPS, pp. 313-317, 1979.
[8]
B. Chor and N. Gilboa. Computational}y Private Information Retrieval In this proceedings- $TOC '97.
[9]
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. 36th Annual IEEE Syrup. Foundations Comp. $c~., pp. 41- 50, 1995.
[10]
O. Goldreich. Personal communication, June of 1996.
[11]
R.L. Rivest, L. Adleman, and M. L. Dertouzos. On data banks and privacy homomorphisms. In Foundations of Secure Computation (eds. R. DeMillo, D. Dobkin, A. Jones, and R. Lipton). Academic Press, 1978.
[12]
O. Goldreich. Towards a theory of software protection and simulation by oblivious RAMs. In Proc. 19th Annual A CM Syrup. Theory Comp., 1987.
[13]
S. Goldwasser, S. Micali and C. Rackoff, The Knowledge Complexity of Interactive Proof-Systems, SIAM J. Comput. 18 (1989), pp. 186-208; (also in STOC 85, pp. 291-304.)
[14]
O. Goldreich, S. Micali, and A. Wigderson. "How to Play Any Mental Game". Proc. of 19th STOC, pp. 218-229, 1987.
[15]
O. Goldreich and R. Ostrovsky. Software protection and simulation by oblivious RAMs. JACM, 1996.
[16]
Goldreich, O., S. Goldwasser, and S. Micali, "How To Construct Random Functions," Journal of the Association for Computing Machinery, Vol. 33, No. 4 (October 1986), 792-807.
[17]
S. Micali. Fair public-key cryptosystems. In Advances in Cryptology--Proc. Crypto '9~, pp. 113-138, 1992.
[18]
R. Ostrovsky. Software protection and simulation on oblivious RAMs. M.I.T. Ph. D. Thesis in Computer Science, June 1992. Preliminary version in Proc. ~2nd Annual ACM Syrup. Theory Comp., 1990.
[19]
A. Shamir. How to Share a Secret. CACM 22:612-613, 1979.
[20]
A proposed federal information processing standard for an escrowed encryption standard. Federal Register, July 30, 1993.
[21]
Yao, A.C., "Theory and Applications of Trapdoor Functions", ~3rd FOC$, 1982, pp. 80-91.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '97: Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
May 1997
752 pages
ISBN:0897918886
DOI:10.1145/258533
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 May 1997

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

STOC97
Sponsor:

Acceptance Rates

STOC '97 Paper Acceptance Rate 75 of 211 submissions, 36%;
Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Upcoming Conference

STOC '25
57th Annual ACM Symposium on Theory of Computing (STOC 2025)
June 23 - 27, 2025
Prague , Czech Republic

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)235
  • Downloads (Last 6 weeks)23
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Distributed Oblivious RAMEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_1547(683-686)Online publication date: 8-Jan-2025
  • (2024)Fast ORAM with server-aided preprocessing and pragmatic privacy-efficiency trade-offCryptography and Communications10.1007/s12095-024-00745-8Online publication date: 24-Sep-2024
  • (2024)Privacy-Preserving DijkstraAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68400-5_3(74-110)Online publication date: 16-Aug-2024
  • (2024)Doubly Efficient Cryptography: Commitments, Arguments and RAM MPCAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_8(240-273)Online publication date: 16-Aug-2024
  • (2024)Compressing Unit-Vector Correlations via Sparse Pseudorandom GeneratorsAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68397-8_11(346-383)Online publication date: 16-Aug-2024
  • (2023)FutORAMa: A Concretely Efficient Hierarchical Oblivious RAMProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623125(3313-3327)Online publication date: 21-Nov-2023
  • (2023)Ramen: Souper Fast Three-Party Computation for RAM ProgramsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3623115(3284-3297)Online publication date: 15-Nov-2023
  • (2023)Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWEProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585175(595-608)Online publication date: 2-Jun-2023
  • (2023)Private Access Control for Function Secret Sharing2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179295(809-828)Online publication date: May-2023
  • (2023)Oblivious RAM with Worst-Case Logarithmic OverheadJournal of Cryptology10.1007/s00145-023-09447-536:2Online publication date: 24-Feb-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media