Private information retrieval

Known as: CPIR, Computational Private Information Retrieval, Private Information Retrieval scheme 
In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1977-2017
02040608019772017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2007
Highly Cited
2007
  • Ian Goldberg
  • 2007 IEEE Symposium on Security and Privacy (SP…
  • 2007
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ logn is a… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present a single-database computationally private information retrieval scheme with polylogarithmic communication complexity… (More)
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Private information retrieval (PIR) schemes enable a user to access one or more servers that hold copies of a database and… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Private information ret rieval (PIR) schemes enable a user to access k replicated copies of a database (k z 2), and privately… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Private Information Retrieval (PIR) schemes allow a user to retrieve the i-th bit of a data string 2, replicated in k 2 2… (More)
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We establish the following, quite unexpected, result: replication of data for the computational Private Information Retrieval… (More)
Is this relevant?
Highly Cited
1996
Highly Cited
1996
We construct a scheme for private information retrieval with k databases and communication complexity O(n 1=(2k?1)). 
Is this relevant?
Highly Cited
1995
Highly Cited
1995
Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a… (More)
  • figure 1
  • figure 2
Is this relevant?