Querying twice to achieve information-theoretic verifiability in private information retrieval

Private Information Retrieval (PIR) protocols allow a client to retrieve any file of interest while keeping the files identity hidden from the database servers. While many existing PIR protocols assume servers to be honest but curious, we investigate the scenario of dishonest servers that provide in...

Full description

Bibliographic Details
Main Authors: Kruglik, Stanislav, Dau, Son Hoang, Kiah, Han Mao, Wang, Huaxiong, Zhang, Liang Feng
Other Authors: School of Physical and Mathematical Sciences
Format: Journal Article
Language:English
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/10356/180554