000 | 02851nam a22004215i 4500 | ||
---|---|---|---|
001 | u374739 | ||
003 | SIRSI | ||
005 | 20160812084249.0 | ||
007 | cr nn 008mamaa | ||
008 | 101109s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642143588 _9978-3-642-14358-8 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aQA76.9.D35 | |
082 | 0 | 4 |
_a005.74 _223 |
100 | 1 |
_aYekhanin, Sergey. _eauthor. |
|
245 | 1 | 0 |
_aLocally Decodable Codes and Private Information Retrieval Schemes _h[recurso electrónico] / _cby Sergey Yekhanin. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aXII, 82 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aInformation Security and Cryptography, _x1619-7100 |
|
505 | 0 | _aLocally decodable codes via the point removal method -- Limitations of the point removal method -- Private information retrieval. | |
520 | _aLocally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency – specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve records from public databases while completely hiding the identity of the retrieved records from database owners. In this book the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes, obtaining new families of each which have much better parameters than those of previously known constructions, and he also proves limitations of two server PIRs in a restricted setting that covers all currently known schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aData structures (Computer science). | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642143571 |
830 | 0 |
_aInformation Security and Cryptography, _x1619-7100 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-14358-8 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c202619 _d202619 |