Author of the publication

Universal Service Providers for Database Private Information Retrieval.

, , and . IACR Cryptology ePrint Archive, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special Section on the Forty-Fifth Annual ACM Symposium on the Theory of Computing (STOC 2013)., , and . SIAM J. Comput., 45 (2): 459-460 (2016)Function Secret Sharing: Improvements and Extensions., , and . ACM Conference on Computer and Communications Security, page 1292-1303. ACM, (2016)Bounded Indistinguishability and the Complexity of Recovering Secrets., , , and . Electron. Colloquium Comput. Complex., (2015)On the Power of Nonlinear Secret-Sharing., and . IACR Cryptology ePrint Archive, (2001)On Pseudorandom Generators with Linear Stretch in NC0., , and . Comput. Complex., 17 (1): 38-69 (2008)Semantic Security under Related-Key Attacks and Applications., , and . ICS, page 45-60. Tsinghua University Press, (2011)Secure Multiparty Computation with Sublinear Preprocessing., , , and . EUROCRYPT (1), volume 13275 of Lecture Notes in Computer Science, page 427-457. Springer, (2022)Oblivious Transfer with Constant Computational Overhead., , , , , , and . EUROCRYPT (1), volume 14004 of Lecture Notes in Computer Science, page 271-302. Springer, (2023)Function Secret Sharing., , and . EUROCRYPT (2), volume 9057 of Lecture Notes in Computer Science, page 337-367. Springer, (2015)Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation., , , , , , and . EUROCRYPT (2), volume 12697 of Lecture Notes in Computer Science, page 871-900. Springer, (2021)