Committed private information retrieval

Q Cao, HY Tran, SH Dau, X Yi, E Viterbo… - … on Research in …, 2023 - Springer
commitment (LMC) and an arbitrary linear PIR scheme to produce a k-verifiable PIR scheme,
termed a committed … of our proposal by implementing the committed PIR schemes based on …

The capacity of private information retrieval from Byzantine and colluding databases

K Banawan, S Ulukus - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
… problem of private information retrieval (PIR). In the classical PIR setting, a user wishes to
retrieve a … For instance, assume that B ≤ B databases commit errors and are identified to be …

Authenticated private information retrieval

S Colombo, K Nikitin, H Corrigan-Gibbs… - 32nd USENIX security …, 2023 - usenix.org
… Our definition generalizes private information retrieval to weighted functions of the database
rows: the client has a secret function f in mind, which must come from a particular class of …

User-private information retrieval based on a peer-to-peer community

J Domingo-Ferrer, M Bras-Amorós, Q Wu… - Data & Knowledge …, 2009 - Elsevier
Private information retrieval (PIR) is normally modeled as a game between two players: a
user and a database. The user wants to retrieve … of PIR user-private information retrieval (UPIR)…

Single database private information retrieval implies oblivious transfer

G Di Crescenzo, T Malkin, R Ostrovsky - … on the Theory and Application of …, 2000 - Springer
… to the PIR subprotocol, using the string R committed in step 1 above as random tape, and
using as a tuple of indices one of the two m-tuples committed in step 1 above. This can be …

Replication is not needed: Single database, computationally-private information retrieval

E Kushilevitz, R Ostrovsky - Proceedings 38th annual …, 1997 - ieeexplore.ieee.org
… the computational Private Information Retrieval problem is not … , computationally-private
information-retrieval scheme with O(… committed value, or a certificate that the database has either …

[BOOK][B] Private information retrieval

X Yi, R Paulet, E Bertino - 2013 - books.google.com
This book deals with Private Information Retrieval (PIR), a technique allowing a user to
retrieve an element from a server in possession of a database without revealing to the server …

Accredited symmetrically private information retrieval

M Layouni - Advances in Information and Computer Security …, 2007 - Springer
With the digitization of society and the continuous migration of services to the electronic
world, individuals have lost significant control over their data. In this paper, we consider the …

Verifiable private information retrieval

S Ben-David, YT Kalai, O Paneth - Theory of Cryptography Conference, 2022 - Springer
A computational PIR scheme allows a client to privately query a database hosted on a single
server without downloading the entire database. We introduce the notion of verifiable PIR (…

Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval

S Kruglik, SH Dau, HM Kiah, H Wang… - … on Information …, 2024 - ieeexplore.ieee.org
… Suppose that a client wants to retrieve a file xi with i ∈ [n]. A private information retrieval (PIR)
protocol allows him/her … For our purposes we require that vector commitment scheme are: …