Single-Database Private Information Retrieval with Constant Communication Rate

@inproceedings{Gentry2005SingleDatabasePI,
  title={Single-Database Private Information Retrieval with Constant Communication Rate},
  author={Craig Gentry and Zulfikar Ramzan},
  booktitle={ICALP},
  year={2005}
}
We present a single-database private information retrieval (PIR) scheme with communication complexity ${\mathcal O}(k+d)$, where k ≥ log n is a security parameter that depends on the database size n and d is the bit-length of the retrieved database block. This communication complexity is better asymptotically than previous single-database PIR schemes. The scheme also gives improved performance for practical parameter settings whether the user is retrieving a single bit or very large blocks. For… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 223 CITATIONS

Sharing sensitive information with privacy

VIEW 5 EXCERPTS
CITES RESULTS, BACKGROUND & METHODS
HIGHLY INFLUENCED

A Survey of Distributed Biometric Authentication Systems

VIEW 8 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Oblivious Location-Based Service Query

  • ArXiv
  • 2019
VIEW 4 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

AN ADAPTIVE HOMOMORPHIC CRYPTOGRAPHY APPROACH FOR LOCATION BASED QUERIES

HazarNaziya Shaik, Aravapalli Rama Satish
  • 2016
VIEW 14 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Efficient Location Privacy In Mobile Applications

VIEW 7 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

A Flexible Framework for Secure and Efficient Program Obfuscation

VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

Design and Analysis of Privacy-Preserving Protocols

VIEW 8 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Privacy-Preserving Ranked Search on Public-Key Encrypted Data

  • 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing
  • 2013
VIEW 7 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

Private data warehouse queries

VIEW 6 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Single-Database Private Information Retrieval from Fully Homomorphic Encryption

  • IEEE Transactions on Knowledge and Data Engineering
  • 2013
VIEW 11 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2003
2019

CITATION STATISTICS

  • 31 Highly Influenced Citations

  • Averaged 13 Citations per year from 2017 through 2019

References

Publications referenced by this paper.