Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sensitive information stored in database servers is retrieved. However, existing PIR schemes assume that any attack to the servers does not change the information stored and any computational results. We present a novel fault-tolerant PIR scheme (called FT-PIR) that protects users' privacy and at the same time ensures service availability in the presence of malicious server faults. Our scheme neither relies on any unproven cryptographic assumptions nor the availability of tamper-proof hardware. A probabilistic verification function is introduced into the scheme to detect corrupted results. Unlike previous PIR research that attempted mainly to de...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
Authenticated PIR enables a server to initially commit to a database of $N$ items, for which a clien...
In the application domain of online information services such as online census information, health r...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
Authenticated PIR enables a server to initially commit to a database of $N$ items, for which a clien...
In the application domain of online information services such as online census information, health r...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
Authenticated PIR enables a server to initially commit to a database of $N$ items, for which a clien...