Private information retrieval

Results: 78



#Item
31Data / Private information retrieval / Information / Database theory / Whois / Oblivious transfer / Database / Server / Cryptographic protocols / Computing / Database management systems

One (Block) Size Fits All: PIR and SPIR with Variable-Length Records via Multi-Block Queries Ryan Henry, Yizhou Huang, and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo ON, Canada N2L 3

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-12-11 07:56:46
32Cryptography / Internet search / Deterministic encryption / Nearest neighbor search / Search engine indexing / Database / Web search query / ANts P2P / Information science / Information retrieval / Searching

Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
33Theoretical computer science / Cryptography / Finite fields / Polynomials / Reed–Solomon error correction / Berlekamp–Welch algorithm / List decoding / Randomized algorithm / XTR / Coding theory / Error detection and correction / Mathematics

Optimally Robust Private Information Retrieval∗ Casey Devet Ian Goldberg University of Waterloo {cjdevet,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2012-06-20 13:33:02
34Information / Database theory / Private information retrieval / Whois / Server / Database server / Database / Internet privacy / Google / Computing / Database management systems / Data

Practical PIR for Electronic Commerce∗ Ryan Henry Femi Olumofin Ian Goldberg

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-08-06 17:44:52
35Internet / Tor / Peer-to-peer / Onion routing / Proxy server / Private information retrieval / Client–server model / Relay / Internet privacy / Cryptography / Computing

PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval ∗ Prateek Mittal1 Femi Olumofin2

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-06-08 08:12:28
36Internet protocols / Internet standards / Domain name system / Private information retrieval / Server / Lightweight Directory Access Protocol / Client–server model / Name server / Whois / Cryptography / Computing / Internet

The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency Casey Devet and Ian Goldberg University of Waterloo, ON, Canada {cjdevet,iang}@cs.uwaterloo.ca

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2014-04-29 09:49:52
37Matrix multiplication / Server / Matrix / Algebra / Mathematics / Private information retrieval

Sublinear Scaling for Multi-Client Private Information Retrieval Wouter Lueks1 and Ian Goldberg2 1 Institute for Computing and Information Sciences (iCIS)

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2015-02-17 16:28:10
38Private information retrieval / Trusted Computing / Tor / Public-key cryptography / Privacy / Server / Secure multi-party computation / Proxy server / Cryptography / Cryptographic protocols / Internet privacy

Private Information Retrieval Techniques for Enabling Location Privacy in Location-Based Services? Ali Khoshgozaran and Cyrus Shahabi University of Southern California Department of Computer Science

Add to Reading List

Source URL: infolab.usc.edu

Language: English - Date: 2009-11-05 01:09:05
39Internet protocols / Internet standards / Private information retrieval / Coprocessor / Trusted Computing / Information privacy / Internet privacy / Lightweight Directory Access Protocol / Privacy / Cryptography / Ethics / Computing

Trusted Computing Protecting Client Privacy with Trusted Computing at the Server Current trusted-computing initiatives usually involve large

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-18 17:24:54
40Private information retrieval / Transmission Control Protocol / Quadratic residue / RSA / Cryptography / Cryptographic protocols / Oblivious transfer

Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang Harvard University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-02-10 23:35:25
UPDATE