Сomputationally efficient private information retrieval protocol
نویسندگان
چکیده
منابع مشابه
Efficient Private Information Retrieval
Informally, private information retrieval for k >= 1 databases (k-PIR) is an interactive scheme that enables a user to make access to (separated) k replicated copies of a database and privately retrieve any single bit out of the n bits of data stored in the database. In this model, “privacy” implies that the user retrieves the bit he is interested in but releases to each database nothing about ...
متن کاملA Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
A PIR scheme is a scheme that allows an user to get an element of a database without giving any information about what part of the database he is interested in. In this paper we present a lattice-based PIR scheme, using an NTRU-like approach, in which the computational cost is a few thousand bit-operations per bit in the database. This improves the protocol computational performance by two orde...
متن کاملPIRMAP: Efficient Private Information Retrieval for MapReduce
Private Information Retrieval (PIR) allows for retrieval of bits from a database in a way that hides a user’s access pattern from the server. However, its practicality in a real-world cloud computing setting has recently been questioned. In such a setting, PIR’s enormous computation and communication overhead is expected to outweigh any cost saving advantages of cloud computing. This paper pres...
متن کاملConstructions for efficient Private Information Retrieval protocols
Private Information Retrieval (PIR) protocols aim at ensuring a user that he can retrieve some part Di of a distributed database D without revealing the index i to the server(s). Most of known PIR protocols focus on decreasing the communication complexity between the client and the server(s). Recently, the use of PIR codes by Fazeli et. al. also lead to a huge reduction of the storage overhead ...
متن کاملEfficient implementation of Private Information Retrieval protocols
A vast amount of today’s Internet users’ on line activities consists of queries to various types of databases. From traditional search engines to modern cloud based services, a person’s everyday queries over a period of time on various data sources, will leave a trail visible to the query processor, which can reveal significant and possibly sensitive information about her. Private Information R...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Scientific and Technical Journal of Information Technologies, Mechanics and Optics
سال: 2016
ISSN: 2226-1494
DOI: 10.17586/2226-1494-2016-16-2-290-294