Showing 1 - 20 results of 39 for search '"private information retrieval"', query time: 0.23s Refine Results
  1. 1

    On Share Conversions for Private Information Retrieval by Anat Paskin-Cherniavsky, Leora Schmerler

    Published 2019-08-01
    “…Beimel et al. in CCC 12&#8217; put forward a paradigm for constructing Private Information Retrieval (PIR) schemes, capturing several previous constructions for <inline-formula> <math display="inline"> <semantics> <mrow> <mi>k</mi> <mo>&#8805;</mo> <mn>3</mn> </mrow> </semantics> </math> </inline-formula> servers. …”
    Get full text
    Article
  2. 2

    Private Information Retrieval with Access Control by Goyal, Pawan

    Published 2023
    “…Private Information Retrieval (PIR) allows a user to query for a record from a remote database without revealing the query to the database server. …”
    Get full text
    Thesis
  3. 3
  4. 4

    On Basing Private Information Retrieval on NP-Hardness by Liu, Tianren, Vaikuntanathan, Vinod

    Published 2021
    “…We make progress along this line of inquiry by showing that the security of single-server single-round private information retrieval schemes cannot be based on NP-hardness, unless the polynomial hierarchy collapses. …”
    Get full text
    Article
  5. 5

    On Basing Private Information Retrieval on NP-Hardness by Liu, Tianren, Vaikuntanathan, Vinod

    Published 2021
    “…We make progress along this line of inquiry by showing that the security of single-server single-round private information retrieval schemes cannot be based on NP-hardness, unless the polynomial hierarchy collapses. …”
    Get full text
    Article
  6. 6
  7. 7

    A study of private information retrieval and related primitives. by Zhang, Liang Feng

    Published 2012
    “…In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extended Private Information Retrieval (EPIR), Locally Decodable Codes (LDCs), Distributed Oblivious Transfer (DOT) and Oblivious Linear Function Evaluation (OLFE). …”
    Get full text
    Thesis
  8. 8
  9. 9

    Single-Server Private Information Retrieval with Sublinear Amortized Time by Henzinger, Alexandra

    Published 2022
    “…We construct new private-information-retrieval protocols in the singleserver setting. …”
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12

    Robust private information retrieval for low encoding/decoding complexity distributed storage by Mingjun Dai, Haiyan Deng, Xiaofeng Li, Gongchao Su, Zhonghao Zhang

    Published 2023-03-01
    “…Abstract Private information retrieval (PIR) means a user retrieves a file while revealing no information on which file is being retrieved. …”
    Get full text
    Article
  13. 13
  14. 14

    Experimental symmetric private information retrieval with measurement-device-independent quantum network by Chao Wang, Wen Yu Kon, Hong Jie Ng, Charles C.-W. Lim

    Published 2022-09-01
    “…We realised a provably-secure symmetric private information retrieval supported by a quantum-secure key-exchange network. …”
    Get full text
    Article
  15. 15

    OnionChopper: A Modular Arithmetic Hardware Accelerator for Private Information Retrieval by Shay, Georgia

    Published 2023
    “…Private information retrieval (PIR) is a protocol which allows a user to retrieve data from a database on a server without the server being able to deduce which records were retrieved. …”
    Get full text
    Thesis
  16. 16

    A Random Server Model for Private Information Retrieval (or Information Theoretic PIR Avoiding Database Replication by Gertner, Yael, Goldwasser, Shafi, Malkin, Tal

    Published 2023
    “…Private information retrieval (PIR) schemes provide a user with information from a database while keeping his query secret from the database manager. …”
    Get full text
  17. 17
  18. 18
  19. 19
  20. 20