Computational Private Information Retrieval (cPIR) protocols allow a client to retrieve one bit from a database, without the server inferring any information about the queried bit. These protocols are too costly in practice because they invoke complex arithmetic operations for every bit of the database. In this paper, we present pCloud, a distributed system that constitutes the first attempt toward practical cPIR. Our approach assumes a disk-based architecture that retrieves one page with a single query. Using a striping technique, we distribute the database to a number of cooperative peers, and leverage their computational resources to process cPIR queries in parallel. We implemented pCloud on the PlanetLab network, and experimented extens...
Private information retrieval (PIR) is a way for clients to query a remote database without the data...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Multi-Server Private Information Retrieval (PIR) is a cryptographic protocol that allows a client to...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Lipmaa's Computational Private Information Retrieval (CPIR) protocol is probably the most bandwidth ...
Private Information Retrieval (PIR) protocols enable a client to access data from a server without r...
Abstract. For a private information retrieval (PIR) scheme to be de-ployed in practice, low communic...
Abstract. Private information retrieval (PIR) is normally modeled as a game between two players: a u...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
Private information retrieval (PIR) is a key building block in many privacy-preserving systems. Unfo...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
Abstract. Private retrieval of public data is useful when a client wants to query a public data serv...
Private information retrieval (PIR) is a way for clients to query a remote database without the data...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Multi-Server Private Information Retrieval (PIR) is a cryptographic protocol that allows a client to...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
Lipmaa's Computational Private Information Retrieval (CPIR) protocol is probably the most bandwidth ...
Private Information Retrieval (PIR) protocols enable a client to access data from a server without r...
Abstract. For a private information retrieval (PIR) scheme to be de-ployed in practice, low communic...
Abstract. Private information retrieval (PIR) is normally modeled as a game between two players: a u...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
Private information retrieval (PIR) is a key building block in many privacy-preserving systems. Unfo...
Thesis (M.S.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Author...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
Abstract. Private retrieval of public data is useful when a client wants to query a public data serv...
Private information retrieval (PIR) is a way for clients to query a remote database without the data...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...