References: Difference between revisions
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
|title=A Lower Bound for One-Round Oblivious RAM | |title=A Lower Bound for One-Round Oblivious RAM | ||
|authors=D. Cash, A. Drucker, and A. Hoover | |authors=D. Cash, A. Drucker, and A. Hoover | ||
|journal=TCC 2020 | |journal=TCC | ||
|srcdetail=2020 | |||
|link=https://eprint.iacr.org/2020/1195 | |link=https://eprint.iacr.org/2020/1195 | ||
}} | |||
{{Reference | |||
|id=chnvw16 |tag=CHNVW16 | |||
|title=Watermarking Cryptographic Capabilities | |||
|authors=A. Cohen, J. Holmgren, R. Nishimaki, V. Vaikuntanathan, and D. Wichs | |||
|journal=STOC | |||
|srcdetail=Pages 1115--1127, 2016 | |||
|link=https://doi.org/10.1145/2897518.2897651 | |||
}} | }} | ||
Line 29: | Line 39: | ||
=== D === | === D === | ||
{{Reference | |||
|id=dmo00 |tag=DMO00 | |||
|title=Single Database Private Information Retrieval Implies Oblivious Transfer | |||
|authors=G. Di Crescenzo, T. Malkin, and R. Ostrovsky | |||
|journal=EUROCRYPT | |||
|srcdetail=Pages 122--138, 2000 | |||
|link=https://doi.org/10.1007/3-540-45539-6_10 | |||
}} | |||
{{Reference | {{Reference | ||
|id=dh76 |tag=DH76 | |id=dh76 |tag=DH76 | ||
Line 67: | Line 86: | ||
=== K === | === K === | ||
{{Reference | |||
|id=ko00 |tag=KO00 | |||
|title=One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval | |||
|authors=E. Kushilevitz and R. Ostrovsky | |||
|journal=EUROCRYPT | |||
|srcdetail=Pages 104--121, 2000 | |||
|link=https://doi.org/10.1007/3-540-45539-6_9 | |||
}} | |||
Revision as of 22:13, 27 June 2024
A
[CP07] Y. Chen and J. Flum. On parameterized path and chordless path problems., Proceedings of the IEEE Conference on Computational Complexity 2007, 250-263.
B
C
[CDH20] D. Cash, A. Drucker, and A. Hoover. A Lower Bound for One-Round Oblivious RAM, TCC, 2020. https://eprint.iacr.org/2020/1195
[CHNVW16] A. Cohen, J. Holmgren, R. Nishimaki, V. Vaikuntanathan, and D. Wichs. Watermarking Cryptographic Capabilities, STOC, Pages 1115--1127, 2016. https://doi.org/10.1145/2897518.2897651
[CHS24] S. Cohen, A. Hoover, and G. Schoenbach. Watermarking Language Models for Many Adaptive Users, Preprint, . https://eprint.iacr.org/2024/759
D
[DMO00] G. Di Crescenzo, T. Malkin, and R. Ostrovsky. Single Database Private Information Retrieval Implies Oblivious Transfer, EUROCRYPT, Pages 122--138, 2000. https://doi.org/10.1007/3-540-45539-6_10
[DH76] W. Diffie and M. E. Hellman. New Directions in Cryptography, IEEE Transactions on Information Theory, . https://ieeexplore.ieee.org/document/1055638
E
[E85] T. ElGamal. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithm, IEEE Transactions on Information Theory, . https://ieeexplore.ieee.org/abstract/document/1057074
F
G
H
[HPPY24] A. Hoover, S. Patel, G. Persiano, and K. Yeo. Plinko: Single-Server PIR with Efficient Updates via Invertible PRFs, Preprint, . https://eprint.iacr.org/2024/318
I
J
K
[KO00] E. Kushilevitz and R. Ostrovsky. One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval, EUROCRYPT, Pages 104--121, 2000. https://doi.org/10.1007/3-540-45539-6_9
L
M
N
O
P
Q
R
[RSA78] R. L. Rivest, A. Shamir, and L. M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, Communications of the ACM, Volume 21, Issue 2, . https://dl.acm.org/doi/10.1145/359340.359342