Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,325 papers from all fields of science
Search
Sign In
Create Free Account
Private information retrieval
Known as:
Pir
, Private Information Retrieval scheme
, Computational Private Information Retrieval
Expand
In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
24 relations
BIT predicate
Binary decision diagram
Byzantine fault tolerance
C++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Private Information Retrieval over Networks
Razane Tajeddine
,
A. Wachter-Zeh
,
C. Hollanti
arXiv.org
2018
Corpus ID: 53046417
In this paper, the problem of providing privacy to users requesting data over a network from a distributed storage system (DSS…
Expand
2014
2014
Publicly Verifiable Boolean Query over Outsourced Encrypted Data
Shunrong Jiang
,
Xiao-yan Zhu
,
Linke Guo
,
Jianqing Liu
Global Communications Conference
2014
Corpus ID: 21726752
Outsourcing storage and computation to the cloud has become a common practice for businesses and individuals. As the cloud is…
Expand
2012
2012
A Comparative Study of the Secret Sharing Algorithms for Secure Data in the Cloud
S. Nirmala
,
S. M. Bhanu
,
Ahtesham Akhtar Patel
,
Oracle India Pvt
International Conference on Cloud Computing
2012
Corpus ID: 50283858
With advances in the field of cloud computing many computing rsources and/or services are being provided to the end user on a pay…
Expand
2010
2010
Silencing induced by inverted repeat constructs in protoplasts of Nicotiana benthamiana
Ling Jiang
,
Jia Wang
,
+4 authors
Qi Zhong
Plant Cell Tissue and Organ Culture
2010
Corpus ID: 35883306
Double-stranded RNA interference can be used to silence gene expression in various organisms. Sustained RNAi-mediated gene…
Expand
Review
2009
Review
2009
Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services
Ali Khoshgozaran
,
C. Shahabi
Privacy in Location-Based Applications
2009
Corpus ID: 7543728
The ubiquity of smartphones and other location-aware hand-held devices has resulted in a dramatic increase in popularity of…
Expand
2004
2004
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
Wen-Guey Tzeng
IEEE transactions on computers
2004
Corpus ID: 35629278
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1…
Expand
2002
2002
Barrier for Information-Theoretic Private Information Retrieval
A. Beimel
,
Yuval Ishai
,
E. Kushilevitz
,
Jean-François Raymond
2002
Corpus ID: 1355763
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database while hiding the identity of…
Expand
2001
2001
Private Information Retrieval Based on the Subgroup Membership Problem
A. Yamamura
,
Taiichi Saito
Australasian Conference on Information Security…
2001
Corpus ID: 2300909
Many algorithmic problems, which are used to prove the security of a cryptographic system, are shown to be characterized as the…
Expand
2000
2000
Practical Private Information Retrieval with Secure Coprocessors
Sean W. Smith
,
D. Safford
2000
Corpus ID: 59851737
What does it take to implement a server that provides access to records in a large database, in a way that ensures that the this…
Expand
2000
2000
Symmetrically Private Information Retrieval (Extended Abstract)
S. Mishra
,
P. Sarkar
2000
Corpus ID: 12921335
In this paper we present a single-round, single-server symmetrically private information retrieval scheme, in which privacy of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE