Sciweavers

31 search results - page 2 / 7
» Single Database Private Information Retrieval with Logarithm...
Sort
View
EUROCRYPT
2000
Springer
13 years 8 months ago
Single Database Private Information Retrieval Implies Oblivious Transfer
Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsk...
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
13 years 9 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin
PKC
2010
Springer
126views Cryptology» more  PKC 2010»
13 years 9 months ago
Multi-query Computationally-Private Information Retrieval with Constant Communication Rate
A fundamental privacy problem in the client-server setting is the retrieval of a record from a database maintained by a server so that the computationally bounded server remains ob...
Jens Groth, Aggelos Kiayias, Helger Lipmaa
IWSEC
2007
Springer
13 years 11 months ago
Accredited Symmetrically Private Information Retrieval
Abstract. With the digitization of society and the continuous migration of services to the electronic world, individuals have lost significant control over their data. In this pap...
Mohamed Layouni
CCS
2004
ACM
13 years 10 months ago
Private inference control
Access control can be used to ensure that database queries pertaining to sensitive information are not answered. This is not enough to prevent users from learning sensitive inform...
David P. Woodruff, Jessica Staddon