Private information retrieval
Semantic Scholar uses AI to extract papers important to this topic.
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR… (More)
We explore the limits of single-server computational private information retrieval (PIR) for the purpose of preserving client… (More)
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ logn is a… (More)
We present a single-database computationally private information retrieval scheme with polylogarithmic communication complexity… (More)
- IACR Cryptology ePrint Archive
Private information retrieval (PIR) schemes enable a user to access one or more servers that hold copies of a database and… (More)
Private information ret rieval (PIR) schemes enable a user to access k replicated copies of a database (k z 2), and privately… (More)
Private Information Retrieval (PIR) schemes allow a user to retrieve the i-th bit of a data string 2, replicated in k 2 2… (More)
We establish the following, quite unexpected, result: replication of data for the computational Private Information Retrieval… (More)
We construct a scheme for private information retrieval with k databases and communication complexity O(n 1=(2k?1)).
Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a… (More)