- 1.A. Ambainis. Upper bound on the communication complexity of private information retrieval. In Proc. of 2,1th ICALP, 1997. Google ScholarDigital Library
- 2.D. Beaver. Commodity-based cryptography. In Proc. of 29~h $TOC, pages 446-455, 1997. Google ScholarDigital Library
- 3.D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In $TA C$, 1990. Google ScholarDigital Library
- 4.D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Proc. of CRYPTO, 1990. Google ScholarDigital Library
- 5.M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for non-cryptographic fault-tolerant distributed computation. In Proc. of 20th $TOC, pages 1-10, 1988. Google ScholarDigital Library
- 6.D. Chaum, C. Cr~peau, and I. Damg&rd. Multiparty unconditionally secure protocols (extended abstract). In Proc. of 20th STOC, pages 11-19, 1988. Google ScholarDigital Library
- 7.B. Chor and N. Gilboa. Computationally private information retrieval. In Proc. of 29th $TOC, pages 304-313, 1997. Google ScholarDigital Library
- 8.B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of 36th FOC$, pages 41-50, 1995. Google ScholarDigital Library
- 9.Y. Gertner, Y. ishai, , E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. of 30th $TOC, 1998. Google ScholarDigital Library
- 10.O. Goldreich. On the foundations of modern cryptography. In Proc. of CRYPTO'97, pages 46-74, 1997. Google ScholarDigital Library
- 11.O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game (extended abstract). In Proc. of 19th $TOC, pages 218-229, 1987. Google ScholarDigital Library
- 12.S. Goldwasser. Multi-party computations: Past and present. In Proc. of 16th PODC, pages 1-6, 1997. Google ScholarDigital Library
- 13.S. Goldwasser. New directions in cryptography: Twenty some years later, in Proc. of 38th FOES, pages 314-324, 1997. Google ScholarDigital Library
- 14.S. Goldwasser and S. Micali. Probabilistic encryption. Journal of computer and systems sciences, 28:270-299, 1984.Google ScholarCross Ref
- 15.E. Kushilevitz and R. Ostrovsky. Single-database computationally private information retrieval. In Proc. of 38th FOC$, 1997. Google ScholarDigital Library
- 16.F.J. Macwilliams and N.J. Sloane. The theory of error correcting codes. North Holland, 1978.Google Scholar
- 17.E. Man. Personal communication, 1997.Google Scholar
- 18.J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. In Proc. of 22th $TOC, pages 213-223, 1990. Journal version to appear in Siam Journal on Computing. Google ScholarDigital Library
- 19.R. Ostrovsky and V. Shoup. Private information storage. In Proc. of ~9th $TOC, pages 294-303, 1997. Google ScholarDigital Library
- 20.A.C. Yao. Protocols for secure computations (extended abstract). In Proc. of 23rd FOC$, pages 160-164, 1982.Google Scholar
Index Terms
- Universal service-providers for database private information retrieval (extended abstract)
Recommendations
Universal Service-Providers for Private Information Retrieval
A private information retrieval scheme allows a user to retrieve a data item of his choice from a remote database (or several copies of a database) while hiding from the database owner which particular data item he is interested in. We consider the ...
Outsourced private information retrieval
WPES '13: Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic societyWe propose a scheme for outsourcing Private Information Retrieval (PIR) to untrusted servers while protecting the privacy of the database owner as well as that of the database clients. We observe that by layering PIR on top of an Oblivious RAM (ORAM) ...
Private information retrieval
CERIAS '15: Proceedings of the 16th Annual Information Security SymposiumPrivate Information Retrieval(PIR) is an important subject in the field of Information Retrieval. PIR allows two parties to communicate without revealing the information to one of the parties. The goal of our project is to implement a Private ...
Comments