Sciweavers

8972 search results - page 6 / 1795
» Private Information Retrieval
Sort
View
EUROCRYPT
2004
Springer
14 years 24 days ago
On the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational com...
Yuval Ishai, Eyal Kushilevitz
CC
2006
Springer
125views System Software» more  CC 2006»
13 years 7 months ago
A tight lower bound for restricted pir protocols
We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are 1-bit long must ask questions that are at least n - 2 bits long, which is nearly equa...
Richard Beigel, Lance Fortnow, William I. Gasarch
DBSEC
2010
101views Database» more  DBSEC 2010»
13 years 8 months ago
Generalizing PIR for Practical Private Retrieval of Public Data
Private retrieval of public data is useful when a client wants to query a public data service without revealing the specific query data to the server. Computational Private Informa...
Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi
PET
2010
Springer
13 years 11 months ago
Privacy-Preserving Queries over Relational Databases
We explore how Private Information Retrieval (PIR) can help users keep their sensitive information from being leaked in an SQL query. We show how to retrieve data from a relational...
Femi G. Olumofin, Ian Goldberg
CVPR
2008
IEEE
14 years 9 months ago
Private Content Based Image Retrieval
For content level access, very often database needs the query as a sample image. However, the image may contain private information and hence the user does not wish to reveal the ...
Jagarlamudi Shashank, Palivela Kowshik, Kannan Sri...