On PIR and Symmetric PIR From Colluding Databases With Adversaries and Eavesdroppers
نویسندگان
چکیده
منابع مشابه
Secure Private Information Retrieval from Colluding Databases with Eavesdroppers
The problem of private information retrieval (PIR) is to retrieve one message out of K messages replicated at N databases, without revealing the identity of the desired message to the databases. We consider the problem of PIR with colluding servers and eavesdroppers, named T-EPIR. Specifically, any T out of N databases may collude, that is, they may communicate their interactions with the user ...
متن کاملPIR Array Codes with Optimal PIR Rate
There has been much recent interest in Private information Retrieval (PIR) in models where a database is stored across several servers using coding techniques from distributed storage, rather than being simply replicated. In particular, a recent breakthrough result of Fazelli, Vardy and Yaakobi introduces the notion of a PIR code and a PIR array code, and uses this notion to produce efficient p...
متن کاملBandwidth Efficient PIR from NTRU
We present a private information retrieval (PIR) scheme based on somewhat homomorphic encryption (SWHE). In particular, we customize an NTRU-based SWHE scheme in order to evaluate a specific class of fixed depth circuits relevant for PIR implementation, thus achieving a more practical implementation. In practice, a SWHE that can evaluate a depth 5 circuit is sufficient to construct a PIR capabl...
متن کاملThe PIR integrated protein databases and data retrieval system
The Protein Information Resource (PIR) provides many databases and tools to support genomic and proteomic research. PIR is a member of UniProt––Universal Protein Resource––the central repository of protein sequence and function, which maintains UniProt Knowledgebase with extensively curated annotation, UniProt Reference databases to speed sequence searches, and UniProt Archive to reflect sequen...
متن کاملReport on PIR with Low Storage Overhead
Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz and Sudan, allows a user to retrieve a data item from a database without revealing which item is retrieved. Two main parameters of a PIR protocol are communication complexity, which is the total number of bits communicated between the user and the servers, and storage overhead, which is the ratio be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Theory
سال: 2019
ISSN: 0018-9448,1557-9654
DOI: 10.1109/tit.2018.2878034