Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit database without revealing to the database server the value of $(i)$. In this paper, we present a PIR protocol with the communication complexity of $(O(gamma log n))$ bits, where $(gamma)$ is the ciphertext size. Furthermore, we extend the PIR protocol to a private block retrieval (PBR) protocol, a natural and more practical extension of PIR in which the user retrieves a block of bits, instead of retrieving single bit. Our protocols are built on the state-of-the-art fully homomorphic encryption (FHE) techniques and provide privacy for the user if the underlying FHE scheme is semantically secure. The total communication complexity of our PBR is $(O(...
We consider the problem of minimizing the communication in single-database private information retri...
Private information retrieval, named PIR, is a set of protocols that is a part of privacy enhancemen...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
Private information retrieval (PIR) protocol is a powerful cryptographic tool and has received consi...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Abstract. We present a private information retrieval (PIR) scheme based on somewhat homomorphic encr...
In this paper we survey the notion of Single-Database Private Information Retrieval (PIR). The first...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
We consider the problem of minimizing the communication in single-database private information retri...
Private information retrieval, named PIR, is a set of protocols that is a part of privacy enhancemen...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
Private information retrieval (PIR) protocol is a powerful cryptographic tool and has received consi...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Abstract. We present a private information retrieval (PIR) scheme based on somewhat homomorphic encr...
In this paper we survey the notion of Single-Database Private Information Retrieval (PIR). The first...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
We consider the problem of minimizing the communication in single-database private information retri...
Private information retrieval, named PIR, is a set of protocols that is a part of privacy enhancemen...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...