Skip to search formSkip to main contentSkip to account menu

Private information retrieval

Known as: Pir, Private Information Retrieval scheme, Computational Private Information Retrieval 
In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
In this paper, the problem of providing privacy to users requesting data over a network from a distributed storage system (DSS… 
2014
2014
Outsourcing storage and computation to the cloud has become a common practice for businesses and individuals. As the cloud is… 
2012
2012
With advances in the field of cloud computing many computing rsources and/or services are being provided to the end user on a pay… 
2010
2010
Double-stranded RNA interference can be used to silence gene expression in various organisms. Sustained RNAi-mediated gene… 
Review
2009
Review
2009
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of… 
2004
2004
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1… 
2002
2002
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database while hiding the identity of… 
2001
2001
Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the… 
2000
2000
What does it take to implement a server that provides access to records in a large database, in a way that ensures that the this… 
2000
2000
In this paper we present a single-round, single-server symmetrically private information retrieval scheme, in which privacy of…