搜索结果: 1-15 共查到“军事学 private information retrieval”相关记录15条 . 查询时间(0.109 秒)
Industrial Feasibility of Private Information Retrieval
Private Information retrieval Survey Implementation
2017/9/1
A popular security problem in database management is how to guarantee to a querying party that the database owner will not learn anything about the data that is retrieved --- a problem known as Privat...
Private Information Retrieval (PIR) allows a client to obtain data from a public database without disclosing the locations accessed. Traditionally, the stress is on preserving sublinear work for the c...
rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval
Private Information Retrieval Secret Sharing
2016/1/26
Even as data and analytics driven applications are becoming increasingly popular, retrieving data from
shared databases poses a threat to the privacy of their users. For example, investors/patients r...
XPIR: Private Information Retrieval for Everyone
Lattices Homomorphic Encryption Private Information Retrieval
2016/1/5
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutually-di...
On Basing Private Information Retrieval on NP-Hardness
Private Information Retrieval NP-hardness Reductions
2015/12/21
The possibility of basing the security of cryptographic objects on the (minimal) assumption
that NP ⊈ BPP is at the very heart of complexity-theoretic cryptography. Most known results
along th...
Outsourced Symmetric Private Information Retrieval
searchable encryption private information retrieval
2014/3/6
In the setting of searchable symmetric encryption (SSE), a data owner D outsources a database (or document/file collection) to a remote server E in encrypted form such that D can later search the coll...
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
applications
2012/8/28
We consider user-private information retrieval (UPIR), an interesting alternative to private information retrieval (PIR) introduced by Domingo-Ferrer et al. In UPIR, the database knows which records h...
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
applications
2012/6/14
We consider user-private information retrieval (UPIR), an interesting alternative to private information retrieval (PIR) introduced by Domingo-Ferrer et al. In UPIR, the database knows which records h...
Extended Combinatorial Constructions for Peer-to-peer User-Private Information Retrieval
applications
2012/3/20
We consider user-private information retrieval (UPIR), an interesting alternative to private information retrieval (PIR) introduced by Domingo-Ferrer et al. In UPIR, the database knows which records h...
Controlling access to personal data through Accredited Symmetrically Private Information Retrieval
Symmetrically private information retrieval anonymous credentials policy enforcement
2009/6/3
With the digitization of society and the continuous migration of services to the electronic
world, individuals have lost significant control over their data. In this paper, we consider the problem
o...
Single Database Private Information Retrieval with Logarithmic Communication
Single Database Private Information Retrieval Logarithmic Communication
2009/3/23
In this paper, we study the problem of single database private information retrieval, and
present schemes with only logarithmic server-side communication complexity. Previously the
best result could...
Private Information Retrieval Using Trusted Hardware
Private Information Retrieval Trusted Hardware
2008/11/28
Private Information Retrieval Using Trusted Hardware.
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
Communication Complexity of Single-Server Private Information Retrieval
2008/5/29
We study the communication complexity of single-server Private Information Retrieval (PIR) protocols that are based on fundamental cryptographic primitives in a black-box manner.
A Fast Protocol for Computationally Private Information Retrieval
Fast Protocol Private Information Retrieval PIR
2008/5/26
We present a new private information retrieval (PIR) protocol. The protocol
is based on a single private, non-shared key cryptosystem; the security of
this cryptosystem is based on a new hardness (s...
A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
Private Information Retrieval Protocol
2008/5/21
A PIR scheme is a scheme that allows an user to get an element of a database without
giving any information about what part of the database he is interested in.
In this paper we present a lattice-ba...