2018 Elsevier Inc. A private information retrieval protocol allows a user to retrieve wth data item (or k items) of its choice from a database of N data items without revealing its choice w to the server. The traditional private information retrieval protocols based on the notion of oblivious transfer must publish the description of each data item stored in the database in order for the user to make a choice before users run the protocol (each data item\u27s content is not revealed though). Aiming to eliminate the information leakage of the data item in the private information retrieval system, in this work, we propose a novel attribute-based private information retrieval protocol which can enhance the data privacy. In our proposed protocol...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
We are specifically concerned with scenarios in which multimedia data is stored once on the server a...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Publicly accessible databases are an indispensable resource for retrieving up to date information. B...
Abstract—Data Privacy is collection of data and dissemination of data. How we analyze the data is ca...
Abstract An information-theoretic private information retrieval protocol allows a user to retrieve a...
Publishing datasets about individuals that contain both relational and transaction (i.e., set-valued...
International audienceWe study the problem of privately performing database queries (i.e., keyword s...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Abstract — Data mining is the process of analyzing data. Data Privacy is collection of data and diss...
Abstract. Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that ca...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
We are specifically concerned with scenarios in which multimedia data is stored once on the server a...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Publicly accessible databases are an indispensable resource for retrieving up to date information. B...
Abstract—Data Privacy is collection of data and dissemination of data. How we analyze the data is ca...
Abstract An information-theoretic private information retrieval protocol allows a user to retrieve a...
Publishing datasets about individuals that contain both relational and transaction (i.e., set-valued...
International audienceWe study the problem of privately performing database queries (i.e., keyword s...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Abstract — Data mining is the process of analyzing data. Data Privacy is collection of data and diss...
Abstract. Attribute Based Encryption (ABE) is a promising public-key cryptographic primitive that ca...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In recent years, there has been much research in the adoption of Ranked Retrieval model (in addition...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
We are specifically concerned with scenarios in which multimedia data is stored once on the server a...