The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings.
DOI: 10.1109/sfcs.2002.1181949
|View full text |Cite
|
Sign up to set email alerts
|

Breaking the O(n/sup 1/(2k-1)/) barrier for information-theoretic Private Information Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
220
0
6

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 167 publications
(228 citation statements)
references
References 16 publications
1
220
0
6
Order By: Relevance
“…But there are also other types of applications which seem to benefit from the use of replicated secret-sharing in different, and sometimes unexpected, ways. For instance, replicated shares yield the most efficient information-theoretic private information retrieval protocols and locally decodable codes [5], the best round complexity for verifiable secret-sharing [18], and the simplest protocols for secure multiparty computation with respect to generalized adversaries [3,25]. Our results on share conversion provide an explanation for the usefulness of the replicated scheme, suggesting that anything that can be achieved using linear secret-sharing can also be achieved (up to an n t overhead) using this specific scheme.…”
Section: Our Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…But there are also other types of applications which seem to benefit from the use of replicated secret-sharing in different, and sometimes unexpected, ways. For instance, replicated shares yield the most efficient information-theoretic private information retrieval protocols and locally decodable codes [5], the best round complexity for verifiable secret-sharing [18], and the simplest protocols for secure multiparty computation with respect to generalized adversaries [3,25]. Our results on share conversion provide an explanation for the usefulness of the replicated scheme, suggesting that anything that can be achieved using linear secret-sharing can also be achieved (up to an n t overhead) using this specific scheme.…”
Section: Our Resultsmentioning
confidence: 99%
“…Our results on share conversion provide an explanation for the usefulness of the replicated scheme, suggesting that anything that can be achieved using linear secret-sharing can also be achieved (up to an n t overhead) using this specific scheme. This may also serve as a useful guideline for the design of cryptographic protocols (e.g., when attempting to improve [5]). …”
Section: Our Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…All known PIR protocols realization can be divided into two classes: single-server protocols (see [2][3][4][5][6][7][8][9][10]) and multi-servers ones (see [11][12][13][14]). …”
Section: Existing Schemesmentioning
confidence: 99%
“…The other direction focussed on constructing the locally decodable codes. Important constructions in this direction for constant query length appeared in [3,4]. Unfortunately, all these constructions yield codes that are exponentially long in k i .…”
Section: Introductionmentioning
confidence: 99%