Proceedings of the Twenty-Ninth Annual ACM Symposium on Theory of Computing - STOC '97 1997
DOI: 10.1145/258533.258609
|View full text |Cite
|
Sign up to set email alerts
|

Computationally private information retrieval (extended abstract)

Abstract: Private information ret rieval (PIR) schemes enable a user to access k replicated copies of a database (k z 2), and privately retrieve one of the n bits of data stored in the databases. This means that the queries give each individual database no partial information (in the information theoretic sense) on the identity of the item retrieved by the user. Today, the best two database scheme (k = 2) has communication complexity O(TZ1/3), while for any constant number, k, the best k database scheme has communicatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
152
0
2

Year Published

1999
1999
2017
2017

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 213 publications
(158 citation statements)
references
References 7 publications
0
152
0
2
Order By: Relevance
“…Chor and Gilboa [11] were the first to relax the absolute privacy offered by multi-server information-theoretic PIR by using cryptographic primitives. They proposed a family of 2-server computationally private PIR schemes by making intractability assumptions on the existence of pseudorandom generators or one-way functions.…”
Section: Introductionmentioning
confidence: 99%
“…Chor and Gilboa [11] were the first to relax the absolute privacy offered by multi-server information-theoretic PIR by using cryptographic primitives. They proposed a family of 2-server computationally private PIR schemes by making intractability assumptions on the existence of pseudorandom generators or one-way functions.…”
Section: Introductionmentioning
confidence: 99%
“…All known PIR protocols realization can be divided into two classes: single-server protocols (see [2][3][4][5][6][7][8][9][10]) and multi-servers ones (see [11][12][13][14]). …”
Section: Existing Schemesmentioning
confidence: 99%
“…Private Information Retrieval (PIR) [6,11,12,19] allows a client to access a dataset on the server obliviously. Single-server PIR techniques can achieve O(β) bandwidth cost per query using FHE techniques [6] for large enough block sizes β.…”
Section: Related Workmentioning
confidence: 99%