A private information retrieval (PIR) scheme allows a client to retrieve a data item $x_i$ among $n$ items $x_1,x_2,\ldots,x_n$ from $k$ servers, without revealing what $i$ is even when $t < k$ servers collude and try to learn $i$. Such a PIR scheme is said to be $t$-private. A PIR scheme is $v$-verifiable if the client can verify the correctness of the retrieved $x_i$ even when $v \leq k$ servers collude and try to fool the client by sending manipulated data. Most of the previous works in the literature on PIR assumed that $v < k$, leaving the case of all-colluding servers open. We propose a generic construction that combines a linear map commitment (LMC) and an arbitrary linear PIR scheme to produce a $k$-verifiable PIR scheme, termed a c...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...
Authenticated PIR enables a server to initially commit to a database of $N$ items, for which a clien...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
International audiencePrivate information retrieval (PIR) protocols allow a user to retrieve entries...
In a Private Information Retrieval (PIR) protocol, a user can download a file from a database withou...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...
Authenticated PIR enables a server to initially commit to a database of $N$ items, for which a clien...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server whi...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
International audiencePrivate information retrieval (PIR) protocols allow a user to retrieve entries...
In a Private Information Retrieval (PIR) protocol, a user can download a file from a database withou...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...