Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modifications as computational vs. information-theoretic privacy protection, correctness in the face of servers that fail to respond or that respond incorrectly, and protection of sensitive data against the database servers themselves. In this paper, we improve on the robustness of PIR in a number of ways. First, we present a Byzantine-robust PIR protocol which provides information-theoretic privacy protection against coalitions of up to all but one of the responding servers, improving the previous result by a factor of 3. In addition, our protocol allows for more of the resp...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
International audiencePrivate information retrieval (PIR) protocols allow a user to retrieve entries...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
International audiencePrivate information retrieval (PIR) protocols allow a user to retrieve entries...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
A private information retrieval (PIR) scheme on coded storage systems with colluding, byzantine, and...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
We present a general framework for private information retrieval (PIR) from arbitrary coded database...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
International audiencePrivate information retrieval (PIR) protocols allow a user to retrieve entries...