In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptographic tools that are widely used in various security-related applications, such as private data-mining schemes and secure function evaluation protocols. The first non-interactive, secure dot-product protocol, widely used in private data-mining schemes, is proposed based on trace functions over finite fields. We further improve the communication overhead of the best, previously known Oblivious Transfer protocol from O ((log(n))2) to O (log(n)), where n is the size of the database. Our communication-efficient Oblivious Transfer protocol is a non-interactive, single-database scheme that is generally built on Homomorphic Encryption Functions. W...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private information retrieval (PIR) protocol is a powerful cryptographic tool and has received consi...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
In this paper, we study the problem of single database private information retrieval, and present sc...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
We consider the problem of minimizing the communication in single-database private information retri...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communicatio...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private information retrieval (PIR) protocol is a powerful cryptographic tool and has received consi...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
In this paper, we study the problem of single database private information retrieval, and present sc...
In this thesis, we study four notions related to Private Information Retrieval (PIR), namely Extend...
We consider the problem of minimizing the communication in single-database private information retri...
Abstract. We propose a one-round 1-out-of-n computationally-private information retrieval protocol f...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
[[abstract]]The most efficient previous oblivious transfer schemes require 2t rounds of communicatio...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
A Single-Database Private Information Retrieval (PIR) is a protocol that allows a user to privately ...
Abstract. Most of the multi-party computation frameworks can be viewed as oblivious databases where ...
In a t-out-n oblivious transfer, the receiver can only receive t messages out of n messages sent by ...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private information retrieval (PIR) protocol is a powerful cryptographic tool and has received consi...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...