Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduous to scale. We explore lower-cost relaxations of information-theoretic PIR, based on dummy queries, sparse vectors, and compositions with an anonymity system. We prove the security of each scheme using a flexible differentially private definition for private queries that can capture notions of imperfect privacy. We show that basic schemes are weak, but some of them can be made arbitrarily safe by composing them with large anonymity systems
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
International audiencePrivate retrieval of public data is useful when a client wants to query a publ...
© International Association for Cryptologic Research 2016. The possibility of basing the security of...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
A private information retrieval (PIR) protocol guar- antees that a user can privately retrieve files...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private information retrieval (PIR) is an important protocol in cryptographic community to ensure pr...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
International audiencePrivate retrieval of public data is useful when a client wants to query a publ...
© International Association for Cryptologic Research 2016. The possibility of basing the security of...
Private Information Retrieval (PIR), despite being well studied, is computationally costly and arduo...
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out...
AbstractPrivate information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit...
Abstract. A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from...
Private Information Retrieval (PIR), which allows users to query one (or many replicated) database(s...
A private information retrieval (PIR) protocol guar- antees that a user can privately retrieve files...
Private Information Retrieval (PIR) protocols allow a user to retrieve a data item from a database w...
Abstract A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from ...
AbstractA Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a...
Since 1995, much work has been done creating protocols for private information retrieval (PIR). Many...
Private information retrieval (PIR) is an important protocol in cryptographic community to ensure pr...
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database wi...
The modern information age is heralded by exciting paradigms ranging from big data, cloud computing ...
International audiencePrivate retrieval of public data is useful when a client wants to query a publ...
© International Association for Cryptologic Research 2016. The possibility of basing the security of...