This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the ...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
International audiencePrivate retrieval of public data is useful when a client wants to query a publ...
In this paper we survey the notion of Single-Database Private Information Retrieval (PIR). The first...
Abstract. Private retrieval of public data is useful when a client wants to query a public data serv...
Abstract. Private information retrieval (PIR) is normally modeled as a game between two players: a u...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
A popular security problem in database management is how to guarantee to a querying party that the d...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
International audiencePrivate retrieval of public data is useful when a client wants to query a publ...
In this paper we survey the notion of Single-Database Private Information Retrieval (PIR). The first...
Abstract. Private retrieval of public data is useful when a client wants to query a public data serv...
Abstract. Private information retrieval (PIR) is normally modeled as a game between two players: a u...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
A popular security problem in database management is how to guarantee to a querying party that the d...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...