Private information retrieval (PIR) protocols allow clients to access database entries without revealing the queried indices. They have many real-world applications, including privately querying patent-, compromised credential-, and contact databases. While existing PIR protocols that have been implemented perform reasonably well in practice, they all have suboptimal asymptotic complexities. A line of work has explored so-called doubly-efficient PIR (DEPIR), which refers to single-server PIR protocols with optimal asymptotic complexities. Recently, Lin, Mook, and Wichs (STOC 2023) presented the first protocol that completely satisfies the DEPIR constraints and can be rigorously proven secure. Unfortunately, their proposal is purely theoret...
We present two new constructions for private information retrieval (PIR) in the classical setting wh...
Imagine one or more non-colluding servers each holding a large public database, e.g., the repository...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private information retrieval (PIR) protocols allow clients to access database entries without revea...
Private information retrieval (PIR) allows a client to read data from a server, without revealing wh...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...
Private Information Retrieval (PIR) facilitates the retrieval of database entries by a client from a...
In Private Information Retrieval (PIR), a client wishes to access an index $i$ from a public $n$-bit...
Private Information Retrieval (PIR) allows several clients to query a database held by one or more s...
Classically, Private Information Retrieval (PIR) was studied in a setting without any pre-processing...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
We construct a sublinear-time single-server pre-processing Private Information Retrieval (PIR) sche...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
We present SimplePIR, the fastest single-server private information retrieval scheme known to date. ...
We present two new constructions for private information retrieval (PIR) in the classical setting wh...
Imagine one or more non-colluding servers each holding a large public database, e.g., the repository...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Private information retrieval (PIR) protocols allow clients to access database entries without revea...
Private information retrieval (PIR) allows a client to read data from a server, without revealing wh...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without d...
Private Information Retrieval (PIR) facilitates the retrieval of database entries by a client from a...
In Private Information Retrieval (PIR), a client wishes to access an index $i$ from a public $n$-bit...
Private Information Retrieval (PIR) allows several clients to query a database held by one or more s...
Classically, Private Information Retrieval (PIR) was studied in a setting without any pre-processing...
International audiencePrivate Information Retrieval (PIR) protocols aim at ensuring a user that he c...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
We construct a sublinear-time single-server pre-processing Private Information Retrieval (PIR) sche...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
We present SimplePIR, the fastest single-server private information retrieval scheme known to date. ...
We present two new constructions for private information retrieval (PIR) in the classical setting wh...
Imagine one or more non-colluding servers each holding a large public database, e.g., the repository...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...