Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on dummy queries, sparse vectors, and compositions with an anonymity system. We prove the security of each scheme using a flexible differentially private definition for private queries that can capture notions of imperfect privacy. We show that basic schemes are weak, but some of them can be made arbitrarily safe by composing them with large anonymity systems
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
This dissertation studies privacy and security problems from an information-theoretic point of view....
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private Information Retrieval (PIR) allows several clients to query a database held by one or more s...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private information retrieval (PIR) protocols allow clients to access database entries without revea...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
This dissertation studies privacy and security problems from an information-theoretic point of view....
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private Information Retrieval (PIR) allows several clients to query a database held by one or more s...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
In recent years, the subject of online privacy has been attracting much interest, especially as more...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Abstract. The goal of Private Information Retrieval (PIR) is the ability to query a database success...
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record out of...
Private Information Retrieval (PIR) addresses the cryptographic problem of hiding sensitive database...
Private information retrieval (PIR) protocols allow clients to access database entries without revea...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
This dissertation studies privacy and security problems from an information-theoretic point of view....