메뉴 건너뛰기




Volumn 7035 LNCS, Issue , 2012, Pages 158-172

Revisiting the computational practicality of private information retrieval

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATION POWER; EXPERIMENTAL TECHNIQUES; MULTI-SERVER; NETWORK BANDWIDTH; PERFORMANCE ANALYSIS; PRIVATE INFORMATION RETRIEVAL; REMOTE SERVERS; SEARCH TERMS; THREE ORDERS OF MAGNITUDE;

EID: 84857066233     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-27576-0_13     Document Type: Conference Paper
Times cited : (64)

References (32)
  • 2
    • 84921020129 scopus 로고    scopus 로고
    • A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol
    • July
    • Aguilar-Melchor, C., Gaborit, P.: A Lattice-Based Computationally- Efficient Private Information Retrieval Protocol. In: WEWORC 2007 (July 2007)
    • (2007) WEWORC 2007
    • Aguilar-Melchor, C.1    Gaborit, P.2
  • 3
    • 70349126126 scopus 로고    scopus 로고
    • Querying Databases Privately
    • Springer, Heidelberg
    • Asonov, D. (ed.): Querying Databases Privately. LNCS, vol. 3128. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3128
    • Asonov, D.1
  • 4
    • 4344573261 scopus 로고    scopus 로고
    • Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing
    • Beimel, A., Ishai, Y., Malkin, T.: Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing. J. Cryptol. 17(2), 125-151 (2004)
    • (2004) J. Cryptol. , vol.17 , Issue.2 , pp. 125-151
    • Beimel, A.1    Ishai, Y.2    Malkin, T.3
  • 5
    • 38049138213 scopus 로고    scopus 로고
    • Public Key Encryption that Allows PIR Queries
    • Menezes, A. (ed.) CRYPTO 2007. Springer, Heidelberg
    • Boneh, D., Kushilevitz, E., Ostrovsky, R., Skeith III, W.E.: Public Key Encryption that Allows PIR Queries. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol. 4622, pp. 50-67. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4622 , pp. 50-67
    • Boneh, D.1    Kushilevitz, E.2    Ostrovsky, R.3    Skeith III, W.E.4
  • 6
    • 1642602228 scopus 로고    scopus 로고
    • Computationally Private Information Retrieval with Polylogarithmic Communication
    • Stern, J. (ed.) EUROCRYPT 1999. Springer, Heidelberg
    • Cachin, C., Micali, S., Stadler, M.A.: Computationally Private Information Retrieval with Polylogarithmic Communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 402-414. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1592 , pp. 402-414
    • Cachin, C.1    Micali, S.2    Stadler, M.A.3
  • 8
    • 0030645563 scopus 로고    scopus 로고
    • Computationally Private Information Retrieval
    • extended abstract
    • Chor, B., Gilboa, N.: Computationally Private Information Retrieval (extended abstract). In: STOC 1997, pp. 304-313 (1997)
    • (1997) STOC 1997 , pp. 304-313
    • Chor, B.1    Gilboa, N.2
  • 9
    • 0037810717 scopus 로고    scopus 로고
    • Mixminion: Design of a Type III Anonymous Remailer Protocol
    • May
    • Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: IEEE S&P, pp. 2-15 (May 2003)
    • (2003) IEEE S&P , pp. 2-15
    • Danezis, G.1    Dingledine, R.2    Mathewson, N.3
  • 10
    • 84857084061 scopus 로고    scopus 로고
    • Towards Practical Private Information Retrieval. Achieving Practical Private Information Retrieval Panel
    • August
    • Di Crescenzo, G., et al.: Towards Practical Private Information Retrieval. Achieving Practical Private Information Retrieval Panel. In: SecureComm 2006 (August 2006), http://www.cs.sunysb.edu/ sion/research/PIR. Panel.Securecomm.2006/giovanni.pdf
    • (2006) SecureComm 2006
    • Di Crescenzo, G.1
  • 12
    • 26444512068 scopus 로고    scopus 로고
    • Single-database private information retrieval with constant communication rate
    • Automata, Languages and Programming: 32nd International Colloquium, ICALP 2005. Proceedings
    • Gentry, C., Ramzan, Z.: Single-Database Private Information Retrieval with Constant Communication Rate. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 803-815. Springer, Heidelberg (2005) (Pubitemid 41436148)
    • (2005) Lecture Notes in Computer Science , vol.3580 , pp. 803-815
    • Gentry, C.1    Ramzan, Z.2
  • 13
    • 0031624875 scopus 로고    scopus 로고
    • Protecting Data Privacy in Private Information Retrieval Schemes
    • Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting Data Privacy in Private Information Retrieval Schemes. In: STOC 1998, pp. 151-160 (1998)
    • (1998) STOC 1998 , pp. 151-160
    • Gertner, Y.1    Ishai, Y.2    Kushilevitz, E.3    Malkin, T.4
  • 14
    • 57149129292 scopus 로고    scopus 로고
    • Private Queries in Location Based Services: Anonymizers are not Necessary
    • Ghinita, G., Kalnis, P., Khoshgozaran, A., Shahabi, C., Tan, K.L.: Private Queries in Location Based Services: Anonymizers are not Necessary. In: SIGMOD 2008, pp. 121-132 (2008)
    • (2008) SIGMOD 2008 , pp. 121-132
    • Ghinita, G.1    Kalnis, P.2    Khoshgozaran, A.3    Shahabi, C.4    Tan, K.L.5
  • 18
    • 84937572541 scopus 로고    scopus 로고
    • Targeted Advertising... And Privacy Too
    • Naccache, D. (ed.) CT-RSA 2001. Springer, Heidelberg
    • Juels, A.: Targeted Advertising... And Privacy Too. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 408-424. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2020 , pp. 408-424
    • Juels, A.1
  • 19
    • 0031378815 scopus 로고    scopus 로고
    • Replication is not needed: Single database, computationally-private information retrieval
    • Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS 1997, p. 364 (1997)
    • (1997) FOCS 1997 , pp. 364
    • Kushilevitz, E.1    Ostrovsky, R.2
  • 20
    • 33645970169 scopus 로고    scopus 로고
    • An Oblivious Transfer Protocol with Log-Squared Communication
    • Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. Springer, Heidelberg
    • Lipmaa, H.: An Oblivious Transfer Protocol with Log-Squared Communication. In: Zhou, J., López, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 314-328. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3650 , pp. 314-328
    • Lipmaa, H.1
  • 21
    • 0000793139 scopus 로고
    • Cramming More Components onto Integrated Circuits
    • Moore, G.E.: Cramming More Components Onto Integrated Circuits. Electronics Magazine 38(8) (1965)
    • (1965) Electronics Magazine , vol.38 , Issue.8
    • Moore, G.E.1
  • 22
    • 84857083443 scopus 로고    scopus 로고
    • National Institute of Standards and Technology: Key Management Guideline (2007), http://csrc.nist.gov/groups/ST/toolkit/index.html
    • (2007) Key Management Guideline
  • 24
    • 77955434225 scopus 로고    scopus 로고
    • Privacy-Preserving Queries over Relational Databases
    • Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. Springer, Heidelberg
    • Olumofin, F., Goldberg, I.: Privacy-Preserving Queries over Relational Databases. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 75-92. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6205 , pp. 75-92
    • Olumofin, F.1    Goldberg, I.2
  • 27
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A.: How to Share a Secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 28
    • 85141026002 scopus 로고    scopus 로고
    • On the Computational Practicality of Private Information Retrieval
    • Sion, R., Carbunar, B.: On the Computational Practicality of Private Information Retrieval. In: NDSS 2007 (2007)
    • (2007) NDSS 2007
    • Sion, R.1    Carbunar, B.2
  • 30
    • 84857089190 scopus 로고    scopus 로고
    • Dhrystone Benchmark: History, Analysis, Scores and Recommendations
    • Weiss, A.R.: Dhrystone Benchmark: History, Analysis, Scores and Recommendations. EEMBC White Paper (2002)
    • (2002) EEMBC White Paper
    • Weiss, A.R.1
  • 31
    • 39049099966 scopus 로고    scopus 로고
    • Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography
    • July
    • Wieschebrink, C.: Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography. In: ISIT 2006, pp. 1733-1737 (July 2006)
    • (2006) ISIT 2006 , pp. 1733-1737
    • Wieschebrink, C.1
  • 32
    • 77951133304 scopus 로고    scopus 로고
    • The Practicality, H.: Of the Keyword Search Using PIR
    • December
    • Yoshida, R., Shigetomi, Y.C., Imai, R., The Practicality, H.: of the Keyword Search Using PIR. In: ISITA 2008, pp. 1-6 (December 2008)
    • (2008) ISITA 2008 , pp. 1-6
    • Yoshida, R.1    Shigetomi, Y.C.2    Imai, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.