A Survey of Single-Database Private Information Retrieval: Techniques and Applications
DOI10.1007/978-3-540-71677-8_26zbMATH Open1161.68435OpenAlexW1822223425WikidataQ56475326 ScholiaQ56475326MaRDI QIDQ5756546FDOQ5756546
Authors: Rafail Ostrovsky, William E. Skeith
Publication date: 4 September 2007
Published in: Public Key Cryptography – PKC 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71677-8_26
Recommendations
- Querying databases privately. A new approach to private information retrieval.
- A novel tamper evident single database information-theoretic private information retrieval for user privacy applications
- A survey on single server private information retrieval in a coding theory perspective
- A t-private k-database information retrieval scheme
- scientific article; zbMATH DE number 5009196
- Information Security and Privacy
- Automata, Languages and Programming
- scientific article; zbMATH DE number 1559546
- Verifiable single-server private information retrieval
Information storage and retrieval of data (68P20) Data encryption (aspects in computer science) (68P25) Cryptography (94A60)
Cited In (25)
- Lower bounds for (batch) PIR with private preprocessing
- Optimal single-server private information retrieval
- Another Look at Extended Private Information Retrieval Protocols
- A communication-efficient private matching scheme in client-server model
- Anonymous permutation routing
- Private information retrieval
- Title not available (Why is that?)
- On privacy-preserving biometric authentication
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time
- Sublinear secure computation from new assumptions
- Information hiding using matroid theory
- Improved and formal proposal for device-independent quantum private query *
- Practical techniques building on encryption for protecting and managing data in the cloud
- Private information retrieval with sublinear online time
- Verifiable single-server private information retrieval from LWE with binary errors
- Homomorphic encryption
- Efficient pre-processing PIR without public-key cryptography
- Lower-bounds on public-key operations in PIR
- Title not available (Why is that?)
- PIR with client-side preprocessing: information-theoretic constructions and lower bounds
- Can we access a database both locally and privately?
- Similarity Based Interactive Private Information Retrieval
- Multiparty proximity testing with dishonest majority from equality testing
- A proposal for device independent probabilistic quantum oblivious transfer
- Automata, Languages and Programming
This page was built for publication: A Survey of Single-Database Private Information Retrieval: Techniques and Applications
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5756546)