A popular security problem in database management is how to guarantee to a querying party that the database owner will not learn anything about the data that is retrieved --- a problem known as Private Information Retrieval (PIR). While a variety of PIR schemes are known, they are rarely considered for practical use cases yet. We investigate the feasibility of PIR in the telecommunications world to open up data of carriers to external parties. To this end, we first provide a comparative survey of the current PIR state of the art (including ORAM schemes as a generalized concept) as well as implementation and analysis of two PIR schemes for the considered use case. While an overall conclusion is that PIR techniques are not too far away from ...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
We propose a scheme for outsourcing Private Informa-tion Retrieval (PIR) to untrusted servers while ...
We study the problem of privacy preserving range search that provides data, query, and response conf...
The objective of the classical Private Information Retrieval (PIR) problem is to enable a user to do...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a ...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
We propose a scheme for outsourcing Private Informa-tion Retrieval (PIR) to untrusted servers while ...
We study the problem of privacy preserving range search that provides data, query, and response conf...
The objective of the classical Private Information Retrieval (PIR) problem is to enable a user to do...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
Abstract. The technique Private Information Retrieval (PIR) perfectly protects a user’s access patte...
The technique "Private Information Retrieval" (PIR) perfectly protects a user’s access pattern to a ...
International audienceA Private Information Retrieval (PIR) scheme is a protocol in which a user ret...
Several private information retrieval (PIR) schemes were proposed to protect users' privacy when sen...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
In this paper, we tackle the private information retrieval (PIR) problem associated with the use of ...