We consider the following strong variant of private information retrieval (PIR). There is a large database x that we want to make publicly available. To this end, we post an encoding X of x together with a short public key pk in a publicly accessible repository. The goal is to allow any client who comes along to retrieve a chosen bit x_i by reading a small number of bits from X, whose positions may be randomly chosen based on i and pk, such that even an adversary who can fully observe the access to X does not learn information about i. Towards solving the above problem, we study a weaker secret key variant where the data is encoded and accessed by the same party. This primitive, that we call an oblivious locally decodable code (OLDC), is i...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
The rapid development of information and communication technologies has motivated many data-centric ...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...
International audienceSince the concept of locally decodable codes was introduced by Katz and Trevis...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We present two new constructions for private information retrieval (PIR) in the classical setting wh...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
Private Information Retrieval (PIR) facilitates the retrieval of database entries by a client from a...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
This dissertation studies privacy and security problems from an information-theoretic point of view....
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
The rapid development of information and communication technologies has motivated many data-centric ...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...
International audienceSince the concept of locally decodable codes was introduced by Katz and Trevis...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
We present two new constructions for private information retrieval (PIR) in the classical setting wh...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
Private Information Retrieval (PIR) facilitates the retrieval of database entries by a client from a...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
This dissertation studies privacy and security problems from an information-theoretic point of view....
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
In this paper, we present a new perspective of single server private information retrieval (PIR) sch...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptograp...
The rapid development of information and communication technologies has motivated many data-centric ...