Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data element retrieved. Several PIR protocols have been proposed, which provide strong guarantees on user privacy. Nevertheless, in many application scenarios it is important to protect the database as well. In this paper, we investigate the amount of data disclosed by the the most prominent PIR protocols during a single run. We show that a malicious user can stage attacks that allow an excessive amount of data to be retrieved from the server. Furthermore, this vulnerability can be exploited even if the client follows the legitimate steps of the PIR protocol, hence the m...
In the application domain of online information services such as online census information, health r...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private Information Retrieval (PIR) protocols enable a client to access data from a server without r...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a ...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
In the application domain of online information services such as online census information, health r...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private Information Retrieval (PIR) protocols enable a client to access data from a server without r...
We explore the limits of single-server computational private information retrieval (PIR) for the pur...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
Along with the technological advancements and the remarkable growth of digital data storage, new cha...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a ...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
In the application domain of online information services such as online census information, health r...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...