Industrial Feasibility of Private Information Retrieval

@article{Jschke2017IndustrialFO,
  title={Industrial Feasibility of Private Information Retrieval},
  author={Angela J{\"a}schke and Bj{\"o}rn Grohmann and Frederik Armknecht and Andreas Schaad},
  journal={IACR Cryptology ePrint Archive},
  year={2017},
  volume={2017},
  pages={813}
}
A popular security problem in database management is how to guarantee to a querying party that the database owner will not learn anything about the data that is retrieved — a problem known as Private Information Retrieval (PIR). While a variety of PIR schemes are known, they are rarely considered for practical use cases yet. We investigate the feasibility of PIR in the telecommunications world to open up data of carriers to external parties. To this end, we first provide a comparative survey of… CONTINUE READING

Figures, Tables, and Topics from this paper.

References

Publications referenced by this paper.
SHOWING 1-10 OF 21 REFERENCES

SE-ORAM: A Storage-Efficient Oblivious RAM for Privacy-Preserving Access to Cloud Storage

Qiumao Ma, Jinsheng Zhang, Yang Peng, Wensheng Zhang, Daji Qiao
  • 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud)
  • 2016
VIEW 2 EXCERPTS

Bandwidth Efficient PIR from NTRU

  • IACR Cryptology ePrint Archive
  • 2014
VIEW 2 EXCERPTS

Garbled RAM Revisited

  • EUROCRYPT
  • 2014
VIEW 2 EXCERPTS

Outsourcing Private RAM Computation

  • 2014 IEEE 55th Annual Symposium on Foundations of Computer Science
  • 2014
VIEW 2 EXCERPTS