Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Private information retrieval

Known as: Pir, Private Information Retrieval scheme, Computational Private Information Retrieval 
In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2008
Highly Cited
2008
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services… Expand
  • figure 1
  • figure 3
  • figure 2
  • table 1
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
  • Ian Goldberg
  • IEEE Symposium on Security and Privacy (SP '07)
  • 2007
  • Corpus ID: 206578602
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We present a single-database private information retrieval (PIR) scheme with communication complexity ${\mathcal O}(k+d)$, where… Expand
Is this relevant?
Highly Cited
2001
Highly Cited
2001
A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a database while hiding the identity… Expand
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We present a single-database computationally private information retrieval scheme with polylogarithmic communication complexity… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a… Expand
  • table I
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k?2… Expand
Is this relevant?
Highly Cited
1998
Highly Cited
1998
Private information retrieval (PIR) schemes enable a user to access one or more servers that hold copies of a database and… Expand
Is this relevant?
Highly Cited
1997
Highly Cited
1997
We establish the following, quite unexpected, result: replication of data for the computational private information retrieval… Expand
Is this relevant?
Highly Cited
1995
Highly Cited
1995
We describe schemes that enable a user to access k replicated copies of a database (k/spl ges/2) and privately retrieve… Expand
  • figure 1
Is this relevant?