[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/795662.796270guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Private information retrieval

Published: 23 October 1995 Publication History

Abstract

We describe schemes that enable a user to access k replicated copies of a database (k/spl ges/2) and privately retrieve information stored in the database. This means that each individual database gets no information on the identity of the item retrieved by the user. For a single database, achieving this type of privacy requires communicating the whole database, or n bits (where n is the number of bits in the database). Our schemes use the replication to gain substantial saving. In particular, we have: A two database scheme with communication complexity of O(n/sup 1/3/). A scheme for a constant number, k, of databases with communication complexity O(n/sup 1/k/). A scheme for 1/3 log/sub 2/ n databases with polylogarithmic (in n) communication complexity.

Cited By

View all
  • (2024)LightPIR: Single-Server PIR via FHE without Gaussian NoiseProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3661140(1049-1065)Online publication date: 1-Jul-2024
  • (2023)One server for the price of twoProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620455(3889-3905)Online publication date: 9-Aug-2023
  • (2023)Authenticated private information retrievalProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620452(3835-3851)Online publication date: 9-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
FOCS '95: Proceedings of the 36th Annual Symposium on Foundations of Computer Science
October 1995
ISBN:0818671831

Publisher

IEEE Computer Society

United States

Publication History

Published: 23 October 1995

Author Tags

  1. communication complexity
  2. database theory
  3. information retrieval
  4. privacy
  5. replicated copies
  6. replicated databases
  7. replication

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 27 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)LightPIR: Single-Server PIR via FHE without Gaussian NoiseProceedings of the 19th ACM Asia Conference on Computer and Communications Security10.1145/3634737.3661140(1049-1065)Online publication date: 1-Jul-2024
  • (2023)One server for the price of twoProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620455(3889-3905)Online publication date: 9-Aug-2023
  • (2023)Authenticated private information retrievalProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620452(3835-3851)Online publication date: 9-Aug-2023
  • (2021)Rate amplification and query-efficient distance amplification for linear LCC and LDCProceedings of the 36th Computational Complexity Conference10.4230/LIPIcs.CCC.2021.1Online publication date: 20-Jul-2021
  • (2021)SnoopyProceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles10.1145/3477132.3483562(655-671)Online publication date: 26-Oct-2021
  • (2021)Practical Security and Privacy for Database SystemsProceedings of the 2021 International Conference on Management of Data10.1145/3448016.3457544(2839-2845)Online publication date: 9-Jun-2021
  • (2021)Private Linear Transformation: The Joint Privacy Case2021 IEEE International Symposium on Information Theory (ISIT)10.1109/ISIT45174.2021.9518099(2125-2130)Online publication date: 12-Jul-2021
  • (2020)DORYProceedings of the 14th USENIX Conference on Operating Systems Design and Implementation10.5555/3488766.3488828(1101-1119)Online publication date: 4-Nov-2020
  • (2019)Protecting accounts from credential stuffing with password breach alertingProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361446(1555-1571)Online publication date: 14-Aug-2019
  • (2019)A Privacy-Preserving Query System using Fully Homomorphic Encryption with Real-World Implementation for Medicine-Side Effect SearchProceedings of the 21st International Conference on Information Integration and Web-based Applications & Services10.1145/3366030.3366061(63-72)Online publication date: 2-Dec-2019
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media