Another Look at Extended Private Information Retrieval Protocols

被引:0
|
作者
Bringer, Julien
Chabanne, Herve
机构
来源
关键词
Private Information Retrieval (PIR); Extended PIR (EPIR); Polynomial Evaluation; Batching; DISCLOSURE; SECRETS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Extended Private Information Retrieval (EPIR) has been introduced at CANS'07 by Bringer et al. as a generalization of the notion of Private Information Retrieval (PIR). The principle is to enable a user to privately evaluate a fixed and public function with two inputs, a chosen block from a database and an additional string. The main contribution of our work is to extend this notion in order to add more flexibility during the system life. As an example, we introduce a general protocol enabling polynomial evaluations. We also revisit the protocol for Hamming distance computation which was described at CANS'07 to obtain a simpler construction. As to practical concern, we explain how amortizing database computations when dealing with several requests.
引用
收藏
页码:305 / 322
页数:18
相关论文
共 50 条
  • [1] Another Look at Information Retrieval as Statistical Translation
    Liu, Yuqi
    Hu, Chengcheng
    Lin, Jimmy
    [J]. PROCEEDINGS OF THE 45TH INTERNATIONAL ACM SIGIR CONFERENCE ON RESEARCH AND DEVELOPMENT IN INFORMATION RETRIEVAL (SIGIR '22), 2022, : 2749 - 2754
  • [2] Degeneracy bounds for private information retrieval protocols
    Maylybaeva, G. A.
    [J]. DISCRETE MATHEMATICS AND APPLICATIONS, 2006, 16 (03): : 245 - 257
  • [3] Extended results on privacy against coalitions of users in user-private information retrieval protocols
    Colleen M. Swanson
    Douglas R. Stinson
    [J]. Cryptography and Communications, 2015, 7 : 415 - 437
  • [4] Extended results on privacy against coalitions of users in user-private information retrieval protocols
    Swanson, Colleen M.
    Stinson, Douglas R.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2015, 7 (04): : 415 - 437
  • [5] EASE OF RETRIEVAL AS INFORMATION - ANOTHER LOOK AT THE AVAILABILITY HEURISTIC
    SCHWARZ, N
    BLESS, H
    STRACK, F
    KLUMPP, G
    RITTENAUERSCHATKA, H
    SIMONS, A
    [J]. JOURNAL OF PERSONALITY AND SOCIAL PSYCHOLOGY, 1991, 61 (02) : 195 - 202
  • [6] Extended Attribute Based Encryption for Private Information Retrieval
    Yinan, Shan
    Cao, Zhenfu
    [J]. 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 923 - 928
  • [7] Hardware Acceleration of Private Information Retrieval Protocols Using GPUs
    Maruseac, Mihai
    Ghinita, Gabriel
    Ouyang, Ming
    Rughinis, Razvan
    [J]. PROCEEDINGS OF THE ASAP2015 2015 IEEE 26TH INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES AND PROCESSORS, 2015, : 120 - 127
  • [8] Extended private information retrieval and its application in biometrics authentications
    Bringer, Julien
    Chabanne, Herve
    Pointcheval, David
    Tang, Qiang
    [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 175 - 193
  • [9] Asymmetry Helps: Improved Private Information Retrieval Protocols for Distributed Storage
    Lin, Hsuan-Yin
    Kumar, Siddhartha
    Rosnes, Eirik
    Graell i Amat, Alexandre
    [J]. 2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 330 - 334
  • [10] Information-theoretic private information retrieval: A unified construction - (Extended abstract)
    Beimel, A
    Ishai, Y
    [J]. AUTOMATA LANGUAGES AND PROGRAMMING, PROCEEDING, 2001, 2076 : 912 - 926