In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenges: the protection of users' privacy and the assurance of service availability. We present a fault-tolerant scheme for private information retrieval (FT-PIR) that protects users' privacy and ensure service provision in the presence of malicious server failures. An error detection algorithm is introduced into this scheme to detect the corrupted results from servers. The analytical and experimental results show that the FT-PIR scheme can tolerate malicious server failures effectively and prevent any information of users front being leaked to attackers. This new scheme...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
We propose a scheme for outsourcing Private Informa-tion Retrieval (PIR) to untrusted servers while ...
A private information retrieval (PIR) protocol guar- antees that a user can privately retrieve files...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a ...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
A popular security problem in database management is how to guarantee to a querying party that the d...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Abstract—Private information retrieval (PIR) systems allow a user to retrieve a record from a public...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
We propose a scheme for outsourcing Private Informa-tion Retrieval (PIR) to untrusted servers while ...
A private information retrieval (PIR) protocol guar- antees that a user can privately retrieve files...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a ...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
A popular security problem in database management is how to guarantee to a querying party that the d...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Abstract—Private information retrieval (PIR) systems allow a user to retrieve a record from a public...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
We propose a scheme for outsourcing Private Informa-tion Retrieval (PIR) to untrusted servers while ...
A private information retrieval (PIR) protocol guar- antees that a user can privately retrieve files...