In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extended Private Information Retrieval (EPIR), Locally Decodable Codes (LDCs), Distributed Oblivious Transfer (DOT) and Oblivious Linear Function Evaluation (OLFE). EPIR allows a user to evaluate a function on one of the data blocks of a server, in such a way that the server learns no information on neither the function nor the identity of the accessed data block, and the user cannot learn more information on the data blocks except the evaluation. Bringer and Chabanne (2009) proposed an EPIR protocol where the user's function is a polynomial over a finite field and the server's data blocks are elements of the field. In Chapt...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
We consider the following strong variant of private information retrieval (PIR). There is a large da...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Extended private information retrieval (EPIR) was defined by Bringer, Chabanne, Pointcheval and Tang...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Private computation is a generalization of private information retrieval, in which a user is able to...
Information-theoretic private information retrieval (PIR) schemes have attractive concrete efficienc...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
We consider the following strong variant of private information retrieval (PIR). There is a large da...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Extended private information retrieval (EPIR) was defined by Bringer, Chabanne, Pointcheval and Tang...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Private computation is a generalization of private information retrieval, in which a user is able to...
Information-theoretic private information retrieval (PIR) schemes have attractive concrete efficienc...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
We consider the following strong variant of private information retrieval (PIR). There is a large da...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...