An information theoretic approach to computer simulation sensitivity analysis
Abstract
Recommendations
Two-Round MPC: Information-Theoretic and Black-Box
Theory of CryptographyAbstractWe continue the study of protocols for secure multiparty computation (MPC) that require only two rounds of interaction. The recent works of Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (Eurocrypt 2018) essentially settle the ...
Robust information-theoretic private information retrieval
SCN'02: Proceedings of the 3rd international conference on Security in communication networksA Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain information on the identity of the item being retrieved. PIR protocols were ...
Robust Information-Theoretic Private Information Retrieval
An information-theoretic private information retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database replicated amongst several servers, such that each server gains absolutely no information on the identity of the ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- IIE: Institute of Industrial Engineers
- IEEE-SMCS: Systems, Man & Cybernetics Society
- ASA: American Statistical Association
- ACM: Association for Computing Machinery
- ORSA: Operations Research Society of America
- SCS: Society for Computer Simulation
- SIGSIM: ACM Special Interest Group on Simulation and Modeling
- TIMS/CSG
- IEEE-CS: Computer Society
- NIST: National Institute of Standards & Technology
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0