Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time
From MaRDI portal
Publication:2139652
DOI10.1007/978-3-030-84259-8_22zbMATH Open1486.68053OpenAlexW3192142816MaRDI QIDQ2139652FDOQ2139652
Authors: Elaine Shi, Waqar Aqeel, B. Chandrasekaran, Bruce M. Maggs
Publication date: 18 May 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84259-8_22
Recommendations
- Reducing the servers' computation in private information retrieval: PIR with preprocessing
- Towards doubly efficient private information retrieval
- scientific article; zbMATH DE number 1759771
- Single-server private information retrieval with sublinear amortized time
- scientific article; zbMATH DE number 2090941
Cites Work
- On lattices, learning with errors, random linear codes, and cryptography
- Title not available (Why is that?)
- Universal service-providers for database private information retrieval (extended abstract)
- Title not available (Why is that?)
- Software protection and simulation on oblivious RAMs
- Private information retrieval
- Oblivious RAM with \(O((\log N)^{3})\) worst-case cost
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Information Security and Privacy
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- Batch codes and their applications
- Sometimes-recurse shuffle. Almost-random permutations in logarithmic expected time
- Title not available (Why is that?)
- Automata, Languages and Programming
- Modified ranks of tensors and the size of circuits
- Private constrained PRFs (and more) from LWE
- Function secret sharing
- How to garble RAM programs?
- Garbled RAM revisited
- Constraining pseudorandom functions privately
- Private puncturable PRFs from standard lattice assumptions
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- \textbf{TWORAM:} efficient oblivious RAM in two rounds with applications to searchable encryption
- Constrained keys for invertible pseudorandom functions
- Can we access a database both locally and privately?
- Towards doubly efficient private information retrieval
- The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries
- Title not available (Why is that?)
- Private information retrieval with sublinear online time
- Private anonymous data access
- Onion ORAM: a constant bandwidth blowup oblivious RAM
Cited In (13)
- Lower bounds for (batch) PIR with private preprocessing
- Optimal single-server private information retrieval
- Reducing the servers' computation in private information retrieval: PIR with preprocessing
- Near-optimal private information retrieval with preprocessing
- Programmable distributed point functions
- \textsf{TreePIR}: sublinear-time and polylog-bandwidth private information retrieval from DDH
- Single-server private information retrieval with sublinear amortized time
- Private information retrieval with sublinear online time
- Efficient pre-processing PIR without public-key cryptography
- Lower-bounds on public-key operations in PIR
- PIR with client-side preprocessing: information-theoretic constructions and lower bounds
- Towards doubly efficient private information retrieval
- Title not available (Why is that?)
This page was built for publication: Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2139652)