2003
DOI: 10.1007/3-540-36467-6_16
|View full text |Cite
|
Sign up to set email alerts
|

Almost Optimal Private Information Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
33
0

Year Published

2003
2003
2014
2014

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 44 publications
(33 citation statements)
references
References 15 publications
0
33
0
Order By: Relevance
“…Subsequently, the databases can respond to users' queries in a less computationally expensive manner using the extra bits. Asonov et al [4,5] and Smith et al [41] similarly explore preprocessing for reducing server-side computation. However, the specialized hardware requirement at the server makes this solution less desirable.…”
Section: Related Workmentioning
confidence: 99%
“…Subsequently, the databases can respond to users' queries in a less computationally expensive manner using the extra bits. Asonov et al [4,5] and Smith et al [41] similarly explore preprocessing for reducing server-side computation. However, the specialized hardware requirement at the server makes this solution less desirable.…”
Section: Related Workmentioning
confidence: 99%
“…Asonov and Freytag's scheme [34] also assumes the SC inside the server and SC first shuffles the entire database according to a random permutation π. When the client request the data item i 1 , the SC fetches the item from π(i 1 ).…”
Section: Private Information Retrievalmentioning
confidence: 99%
“…Secure query processing (including the SNN problem) is related to but different from another well known problem called private information retrieval (PIR) [3], [10], [20]. In PIR, the objective is to prevent the server from knowing anything about which records have been retrieved/accessed by a user query, while the server is allowed to know all of the tuples in the database.…”
Section: Related Workmentioning
confidence: 99%