Sciweavers

43 search results - page 3 / 9
» On Basing Private Information Retrieval on NP-Hardness
Sort
View
ICALP
2005
Springer
14 years 3 months ago
Single-Database Private Information Retrieval with Constant Communication Rate
We present a single-database private information retrieval (PIR) scheme with communication complexity O(k+d), where k ≥ log n is a security parameter that depends on the database...
Craig Gentry, Zulfikar Ramzan
ISW
2010
Springer
13 years 8 months ago
Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups
A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a data- base in a manner that prevents the database from knowing which...
Jonathan T. Trostle, Andy Parrish
CVPR
2008
IEEE
15 years 12 days ago
Private Content Based Image Retrieval
For content level access, very often database needs the query as a sample image. However, the image may contain private information and hence the user does not wish to reveal the ...
Jagarlamudi Shashank, Palivela Kowshik, Kannan Sri...
SIGMOD
2011
ACM
241views Database» more  SIGMOD 2011»
13 years 1 months ago
Neighborhood based fast graph search in large networks
Complex social and information network search becomes important with a variety of applications. In the core of these applications, lies a common and critical problem: Given a labe...
Arijit Khan, Nan Li, Xifeng Yan, Ziyu Guan, Supriy...
DBSEC
2010
101views Database» more  DBSEC 2010»
13 years 12 months ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi