We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval (CPIR) scheme [20], which provides log-squared communication complexity. In the proposed schemes, instead of binary decision diagrams utilized in the original CPIR, we employ an octal tree based approach, in which non-sink nodes have eight child nodes. Using octal trees offers two advantages: i) a serial implementation of the proposed scheme in software is faster than the original scheme and ii) its bandwidth usage becomes less than the original scheme when the number of items in the data set is moderately high (e.g., 4,096 for 80-bit security level using Damga rd-Jurik cryptosystem). In addition, we present a highly-optimized parallel algo...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
We establish the following, quite unexpected, result: replication of data for the computational Priv...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
Lipmaa's Computational Private Information Retrieval (CPIR) protocol is probably the most bandwidth ...
Private Information Retrieval (PIR) enables the data owners to share and/or retrieve data on remote ...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a...
In this paper, we study the problem of single database private information retrieval, and present sc...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
Abstract. For a private information retrieval (PIR) scheme to be de-ployed in practice, low communic...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
We establish the following, quite unexpected, result: replication of data for the computational Priv...
We present scalable and parallel versions of Lipmaa’s computationally-private information retrieval ...
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval ...
Lipmaa's Computational Private Information Retrieval (CPIR) protocol is probably the most bandwidth ...
Private Information Retrieval (PIR) enables the data owners to share and/or retrieve data on remote ...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Existing single server Private Information Retrieval (PIR) protocols are far from practical. To be p...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a...
In this paper, we study the problem of single database private information retrieval, and present sc...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database witho...
Abstract. For a private information retrieval (PIR) scheme to be de-ployed in practice, low communic...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private Information Retrieval (PIR) allows a user to retrieve the (i)th bit of an (n)-bit database w...
Private Information Retrieval (PIR) allows a user to retrieve the $(i)$th bit of an $(n)$-bit databa...
We establish the following, quite unexpected, result: replication of data for the computational Priv...