Lipmaa's Computational Private Information Retrieval (CPIR) protocol is probably the most bandwidth efficient method in the literature, although its computational complexity is a limiting factor for practical applications as it is based on expensive public key operations. Utilizing binary decision diagrams (Bdd) and the Damgård–Jurik cryptosystem, Lipmaa's CPIR performs three modular exponentiation operations per internal node in Bdd. In this paper, we present a new CPIR protocol, which reduces the number of exponentiation operations to 1 per first-level internal nodes and 2 per other internal nodes of the Bdd. For 1024-bit exponents (i.e. 80-bit security level) and 32 768 items, when compared with the fastest parallel implementation in the...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Abstract. We present a private information retrieval (PIR) scheme based on somewhat homomorphic encr...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
Private Information Retrieval (PIR) enables the data owners to share and/or retrieve data on remote ...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from...
Private information retrieval (PIR) is a key building block in many privacy-preserving systems. Unfo...
Private Information Retrieval (PIR) protocols enable a client to access data from a server without r...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
In PETS 2015, Kiayias, Leonardos, Lipmaa, Pavlyk, and Tang proposed the first $(n, 1)$-CPIR protocol...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Abstract. We present a private information retrieval (PIR) scheme based on somewhat homomorphic encr...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
Private Information Retrieval (PIR) enables the data owners to share and/or retrieve data on remote ...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from...
Private information retrieval (PIR) is a key building block in many privacy-preserving systems. Unfo...
Private Information Retrieval (PIR) protocols enable a client to access data from a server without r...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
In PETS 2015, Kiayias, Leonardos, Lipmaa, Pavlyk, and Tang proposed the first $(n, 1)$-CPIR protocol...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Abstract. We present a private information retrieval (PIR) scheme based on somewhat homomorphic encr...