Showing 21 - 39 results of 39 for search '"private information retrieval"', query time: 0.10s Refine Results
  1. 21
  2. 22
  3. 23
  4. 24
  5. 25

    Efficient Fully Homomorphic Encryption from (Standard) LWE by Brakerski, Zvika, Vaikuntanathan, Vinod

    Published 2018
    “…Key words. cryptology, public-key encryption, fully homomorphic encryption, learning with errors, private information retrieval…”
    Get full text
    Get full text
    Article
  6. 26

    Some Open Problems in Information-Theoretic Cryptography by Vaikuntananthan, Vinod

    Published 2021
    “…We will describe several such problems that arise in the study of private information retrieval, secure multi-party computation, secret sharing, private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). …”
    Get full text
    Article
  7. 27

    Some Open Problems in Information-Theoretic Cryptography by Vaikuntananthan, Vinod

    Published 2021
    “…We will describe several such problems that arise in the study of private information retrieval, secure multi-party computation, secret sharing, private simultaneous messages (PSM) and conditional disclosure of secrets (CDS). …”
    Get full text
    Article
  8. 28

    Deceptive Information Retrieval by Sajani Vithana, Sennur Ulukus

    Published 2024-03-01
    “…Conceptually, DIR is an extension of private information retrieval (PIR). In PIR, a user downloads a required file without revealing its index to any of the databases. …”
    Get full text
    Article
  9. 29

    A Shannon-Theoretic Approach to the Storage–Retrieval Trade-Off in PIR Systems by Chao Tian, Hua Sun, Jun Chen

    Published 2023-01-01
    “…We consider the storage–retrieval rate trade-off in private information retrieval (PIR) systems using a Shannon-theoretic approach. …”
    Get full text
    Article
  10. 30

    Splinter: Practical Private Queries on Public Data by Wang, Frank, Yun, Catherine, Goldwasser, Shafi, Vaikuntananthan, Vinod, Zaharia, Matei

    Published 2021
    “…Splinter uses and extends a new cryptographic primitive called Function Secret Sharing (FSS) that makes it up to an order of magnitude more efficient than prior systems based on Private Information Retrieval and garbled circuits. We develop protocols extending FSS to new types of queries, such as MAX and TOPK queries. …”
    Get full text
    Article
  11. 31

    Low Communication-Cost PSI Protocol for Unbalanced Two-Party Private Sets by Jingyu Ning, Zhenhua Tan, Kaibing Zhang, Weizhong Ye

    Published 2024-01-01
    “…The queries are implemented by private information retrieval which is constructed with trapdoor hash function. …”
    Get full text
    Article
  12. 32

    Riffle: An Efficient Communication System With Strong Anonymity by Kwon, Albert Hyukjae, Lazar, David, Devadas, Srinivas, Ford, Bryan

    Published 2020
    “…Riffle uses a new hybrid verifiable shuffle technique and private information retrieval for bandwidth- and computation-efficient anonymous communication. …”
    Get full text
    Article
  13. 33

    Conditional Disclosure of Secrets via Non-linear Reconstruction by Liu, Tianren, Vaikuntanathan, Vinod, Wee, Hoeteck

    Published 2021
    “…To obtain these results, we draw upon techniques for non-linear reconstruction developed in the context of information-theoretic private information retrieval. We further extend our results to the setting of private simultaneous messages (PSM), and provide applications such as an improved attribute-based encryption (ABE) for quadratic polynomials.…”
    Get full text
    Article
  14. 34

    On the Bringer–Chabanne EPIR protocol for polynomial evaluation by Chee, Yeow Meng, Wang, Huaxiong, Zhang, Liang Feng

    Published 2013
    “…Extended private information retrieval (EPIR) was defined by Bringer, Chabanne, Pointcheval and Tang at CANS 2007 and generalized by Bringer and Chabanne at AFRICACRYPT 2009. …”
    Get full text
    Get full text
    Journal Article
  15. 35
  16. 36
  17. 37

    Towards breaking the exponential barrier for general secret sharing by Liu, Tianren, Vaikuntanathan, Vinod, Wee, Hoeteck

    Published 2020
    “…Our construction draws upon a rich interplay amongst old and new problems in information-theoretic cryptography: from secret-sharing, to multi-party computation, to private information retrieval. Along the way, we also construct the first multi-party conditional disclosure of secrets (CDS) protocols for general functions F: {0, 1}[superscript n]→ {0, 1} with communication complexity 2[superscript O(√ n log n)].…”
    Get full text
    Article
  18. 38

    Query-efficient locally decodable codes of subexponential length by Chee, Yeow Meng, Feng, Tao, Ling, San, Wang, Huaxiong, Zhang, Liang Feng

    Published 2012
    “…We also obtain new efficient private information retrieval (PIR) schemes from the new query-efficient LDCs.…”
    Get full text
    Get full text
    Journal Article
  19. 39

    New Bounds and a Generalization for Share Conversion for 3-Server PIR by Anat Paskin-Cherniavsky, Olga Nissenbaum

    Published 2022-04-01
    “…Private Information Retrieval (PIR) protocols, which allow the client to obtain data from servers without revealing its request, have many applications such as anonymous communication, media streaming, blockchain security, advertisement, etc. …”
    Get full text
    Article