Private information retrieval

From MaRDI portal
Publication:3158526

DOI10.1145/293347.293350zbMath1065.68524OpenAlexW2073346043WikidataQ55980348 ScholiaQ55980348MaRDI QIDQ3158526

Madhu Sudan, Eyal Kushilevitz, Benny Chor, Oded Goldreich

Publication date: 25 January 2005

Published in: Journal of the ACM (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/293347.293350




Related Items (82)

Private Sequential LearningSome basics on privacy techniques, anonymization and their big data challengesOn the power of amortization in secret sharing: \(d\)-uniform secret sharing and CDS with constant information ratePuncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and timeThe order of communication complexity of PIR-protocolsTowards breaking the exponential barrier for general secret sharingQuantum symmetrically-private information retrievalPIR codes with short block lengthGarbled circuits with sublinear evaluatorSingle-server private information retrieval with sublinear amortized timeAuthentication in Constrained SettingsCredibility in private set membershipErasures versus errors in local decoding and property testingFast systematic encoding of multiplicity codesLCD matrix product codes with an applicationA novel quantum private set intersection scheme with a semi-honest third partyOptimal single-server private information retrievalLower bounds for (batch) PIR with private preprocessingPrivacy-enhanced attribute-based private information retrievalEfficient \(k\)-out-of-\(n\) oblivious transfer scheme with the ideal communication costCuckoo hashing in cryptography: optimal parameters, robustness and applicationsPrivate join and compute from PIR with defaultNew flexible quantum private query protocol against rotation noiseUnnamed ItemPrivate information retrieval schemes using cyclic codesOn the optimal communication complexity of error-correcting multi-server PIRFrom private simultaneous messages to zero-information Arthur-Merlin protocols and backPrivate Information Retrieval from Coded Databases with Colluding ServersQuery-efficient locally decodable codes of subexponential lengthMulti-client oblivious RAM with poly-logarithmic communicationLow-Leakage Secure Search for Boolean ExpressionsFully homomorphic SIMD operationsOn Privacy-Preserving Biometric AuthenticationQuantum Cryptography: Key Distribution and BeyondFoundations of Homomorphic Secret SharingImproved user-private information retrieval via finite geometryHypercubes and Private Information RetrievalConditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and SeparationsPrivacy protection in on-line shopping for electronic documentsSearchable symmetric encryption over multiple serversAn optimal distributed discrete log protocol with applications to homomorphic secret sharingAsymptotically Tight Bounds for Composing ORAM with PIRPrivate Puncturable PRFs from Standard Lattice AssumptionsShort Locally Testable Codes and Proofs: A Survey in Two PartsLocal Property Reconstruction and MonotonicityOptimal configurations for peer-to-peer user-private information retrievalAbstractions of non-interference security: probabilistic versus possibilisticQuantum private information retrieval has linear communication complexityGeneric construction of designated tester public-key encryption with keyword searchSome results on query processes and reconstruction functions for unconditionally secure 2-server 1-round binary private information retrieval protocolsFast Private Norm Estimation and Heavy HittersThe communication complexity of private simultaneous messages, revisitedPrivate Database Access with HE-over-ORAM ArchitectureOn Basing Private Information Retrieval on NP-HardnessExponential lower bound for 2-query locally decodable codes via a quantum argumentPolylogarithmic two-round argument systemsInformation hiding using matroid theorySecurity and privacy aspects in MapReduce on clouds: a surveyPrivate Information Retrieval with Preprocessing Based on the Approximate GCD ProblemCommunication-Efficient Private Protocols for Longest Common SubsequenceHigh-entropy dual functions over finite fields and locally decodable codesPrivate multiparty sampling and approximation of vector combinationsLocally decodable and updatable non-malleable codes and their applicationsMulti-value private information retrieval with colluding databases via trace functionsPrivacy-Preserving k-Nearest Neighbour Query on Outsourced DatabaseOn Sums of Locally Testable Affine Invariant PropertiesLimits on the Rate of Locally Testable Affine-Invariant CodesVerifiable single-server private information retrieval from LWE with binary errorsPrivate information retrieval with sublinear online timeShort Locally Testable Codes and ProofsAnother Look at Extended Private Information Retrieval ProtocolsQuantum Homomorphic Encryption for Polynomial-Sized CircuitsBreaking the Circuit Size Barrier for Secure Computation Under DDHOblivious keyword searchQuantum Private QueriesOutlaw distributions and locally decodable codesA general private information retrieval scheme for MDS coded databases with colluding serversA combination of testability and decodability by tensor productsPrivate Information Retrieval Using Trusted HardwareHomomorphic EncryptionSome Open Problems in Information-Theoretic CryptographyReed-Muller Codes




This page was built for publication: Private information retrieval