Committed private information retrieval
… commitment (LMC) and an arbitrary linear PIR scheme to produce a k-verifiable PIR scheme,
termed a committed … of our proposal by implementing the committed PIR schemes based on …
termed a committed … of our proposal by implementing the committed PIR schemes based on …
The capacity of private information retrieval from Byzantine and colluding databases
… problem of private information retrieval (PIR). In the classical PIR setting, a user wishes to
retrieve a … For instance, assume that B ≤ B databases commit errors and are identified to be …
retrieve a … For instance, assume that B ≤ B databases commit errors and are identified to be …
Authenticated private information retrieval
… Our definition generalizes private information retrieval to weighted functions of the database
rows: the client has a secret function f in mind, which must come from a particular class of …
rows: the client has a secret function f in mind, which must come from a particular class of …
User-private information retrieval based on a peer-to-peer community
J Domingo-Ferrer, M Bras-Amorós, Q Wu… - Data & Knowledge …, 2009 - Elsevier
… Private information retrieval (PIR) is normally modeled as a game between two players: a
user and a database. The user wants to retrieve … of PIR user-private information retrieval (UPIR)…
user and a database. The user wants to retrieve … of PIR user-private information retrieval (UPIR)…
Single database private information retrieval implies oblivious transfer
… to the PIR subprotocol, using the string R committed in step 1 above as random tape, and
using as a tuple of indices one of the two m-tuples committed in step 1 above. This can be …
using as a tuple of indices one of the two m-tuples committed in step 1 above. This can be …
Replication is not needed: Single database, computationally-private information retrieval
E Kushilevitz, R Ostrovsky - Proceedings 38th annual …, 1997 - ieeexplore.ieee.org
… the computational Private Information Retrieval problem is not … , computationally-private
information-retrieval scheme with O(… committed value, or a certificate that the database has either …
information-retrieval scheme with O(… committed value, or a certificate that the database has either …
[BOOK][B] Private information retrieval
This book deals with Private Information Retrieval (PIR), a technique allowing a user to
retrieve an element from a server in possession of a database without revealing to the server …
retrieve an element from a server in possession of a database without revealing to the server …
Accredited symmetrically private information retrieval
M Layouni - Advances in Information and Computer Security …, 2007 - Springer
With the digitization of society and the continuous migration of services to the electronic
world, individuals have lost significant control over their data. In this paper, we consider the …
world, individuals have lost significant control over their data. In this paper, we consider the …
Verifiable private information retrieval
A computational PIR scheme allows a client to privately query a database hosted on a single
server without downloading the entire database. We introduce the notion of verifiable PIR (…
server without downloading the entire database. We introduce the notion of verifiable PIR (…
Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval
… Suppose that a client wants to retrieve a file xi with i ∈ [n]. A private information retrieval (PIR)
protocol allows him/her … For our purposes we require that vector commitment scheme are: …
protocol allows him/her … For our purposes we require that vector commitment scheme are: …
Related searches
- computationally private information retrieval
- single database private information retrieval
- capacity of private information retrieval
- two server private information retrieval
- symmetrically private information retrieval
- single server private information retrieval
- multi-server private information retrieval
- robust private information retrieval
- private information retrieval result verification
- efficient private information retrieval
- communication complexity of private information retrieval
- practical private information retrieval
- weakly private information retrieval
- private information retrieval traffic constraints
- private information retrieval storage overhead
- private information retrieval unified construction