Abstract. Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the subgroup membership problem. We then apply...
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Abstract. The ubiquity of smartphones and other location-aware handheld devices has resulted in a dramatic increase in popularity of locationbased services (LBS) tailored to user l...
d abstract) Eyal Kushilevitz Rafail Ostrovskyy Technion Bellcore We establish the following, quite unexpected, result: replication of data for the computational Private Informatio...
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...