All-or-Nothing Disclosure of Secrets, CRYPTO, ser, pp.234-238, 1986. ,
DOI : 10.1007/3-540-47721-7_17
Founding Cryptography on Oblivious Transfer, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp.2-4, 1988. ,
A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol, ASIACRYPT, ser, pp.357-371, 1998. ,
DOI : 10.1007/3-540-49649-1_28
Private Access to Distributed Information, 2004. ,
Computationally Private Information Retrieval with Polylogarithmic Communication, Advances in Cryptology: Proceedings of EUROCRYPT, pp.402-414, 1999. ,
DOI : 10.1007/3-540-48910-X_28
Single Database Private Information Retrieval with Logarithmic Communication, ACISP: Information Security and Privacy: Australasian Conference, pp.50-61, 2004. ,
DOI : 10.1007/978-3-540-27800-9_5
An Oblivious Transfer Protocol with Log-Squared Communication, ISC, ser, pp.314-328, 2005. ,
DOI : 10.1007/11556992_23
Single-Database Private Information Retrieval with Constant Communication Rate, ICALP: Annual International Colloquium on Automata, Languages and Programming, pp.803-815, 2005. ,
DOI : 10.1007/11523468_65
From DC-nets to pMIXes: multiple variants for anonymous communications, Fifth IEEE International Symposium on Network Computing and Applications, pp.163-172, 2006. ,
Private Searching on Streaming Data, CRYPTO, ser, pp.223-240, 2005. ,
DOI : 10.1007/11535218_14
Practical server privacy with secure coprocessors, IBM Systems Journal, vol.40, issue.3, pp.683-695, 2001. ,
DOI : 10.1147/sj.403.0683
Almost Optimal Private Information Retrieval, Lecture Notes in Computer Science, vol.2482, pp.209-223, 2002. ,
DOI : 10.1007/3-540-36467-6_16
A Lattice-Based Computationally- Efficient PIR Protocol Under submission, 2006. ,
NTRU: A ring-based public key cryptosystem, 3rd International Algorithmic Number Theory Symposium (ANTS), pp.267-288, 1998. ,
DOI : 10.1007/BFb0054868
A Survey on Private Information Retrieval, Bulletin of the European Association for Theoretical Computer Science, vol.82, pp.72-107, 2004. ,
Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract), IEEE Symposium on Foundations of Computer Science (FOCS), pp.364-373, 1997. ,
A Length-Flexible Threshold Cryptosystem with Applications, pp.350-364, 2003. ,
Querying Databases Privately: A New Approach to Private Information Retrieval, ser. Lecture Notes in Computer Science, 2004. ,
DOI : 10.1007/b98671
Nielsen Law of internet bandwidth, 1998. ,
On the Computational Practicality of Private Information Retrieval, 14th Network and Distributed Systems Security Simposium, 2007. ,