The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could obtain. We provide an extension of the method under which perfect security can still be achieved
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
A popular security problem in database management is how to guarantee to a querying party that the d...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In the application domain of online information services such as online census information, health r...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
A popular security problem in database management is how to guarantee to a querying party that the d...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In the application domain of online information services such as online census information, health r...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...