Global Information Lookup Global Information

Private information retrieval information


In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-n oblivious transfer, where it is also required that the user should not get information about other database items.

One trivial, but very inefficient way to achieve PIR is for the server to send an entire copy of the database to the user. In fact, this is the only possible protocol (in the classical or the quantum setting[1]) that gives the user information theoretic privacy for their query in a single-server setting.[2] There are two ways to address this problem: make the server computationally bounded or assume that there are multiple non-cooperating servers, each having a copy of the database.

The problem was introduced in 1995 by Chor, Goldreich, Kushilevitz and Sudan[2] in the information-theoretic setting and in 1997 by Kushilevitz and Ostrovsky in the computational setting.[3] Since then, very efficient solutions have been discovered. Single database (computationally private) PIR can be achieved with constant (amortized) communication and k-database (information theoretic) PIR can be done with communication.

  1. ^ Baumeler, Ämin; Broadbent, Anne (17 April 2014). "Quantum Private Information Retrieval has Linear Communication Complexity". Journal of Cryptology. 28: 161–175. arXiv:1304.5490. doi:10.1007/s00145-014-9180-2. S2CID 1450526.
  2. ^ a b Chor, Benny; Kushilevitz, Eyal; Goldreich, Oded; Sudan, Madhu (1 November 1998). "Private information retrieval" (PDF). Journal of the ACM. 45 (6): 965–981. CiteSeerX 10.1.1.51.3663. doi:10.1145/293347.293350. S2CID 544823.
  3. ^ Kushilevitz, Eyal; Ostrovsky, Rafail (1997). "Replication is not needed: single database, computationally-private information retrieval". Proceedings of the 38th Annual Symposium on Foundations of Computer Science. Miami Beach, Florida, USA: IEEE Computer Society. pp. 364–373. CiteSeerX 10.1.1.56.2667. doi:10.1109/SFCS.1997.646125. ISBN 978-0-8186-8197-4. S2CID 11000506.

and 25 Related for: Private information retrieval information

Request time (Page generated in 0.8806 seconds.)

Private information retrieval

Last Update:

In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a...

Word Count : 2183

Locally decodable code

Last Update:

derandomization, theory of fault tolerant computation, and private information retrieval schemes. Locally decodable codes are especially useful for data...

Word Count : 3062

BIT predicate

Last Update:

representations of set data structures using bit vectors, in defining the private information retrieval problem from communication complexity, and in descriptive complexity...

Word Count : 2127

Oblivious transfer

Last Update:

oblivious transfer is a strengthening of private information retrieval, in which the database is not kept private. Claude Crépeau showed that Rabin's oblivious...

Word Count : 1967

Geographic information retrieval

Last Update:

Geographic information retrieval (GIR) or geographical information retrieval systems are search tools for searching the Web, enterprise documents, and...

Word Count : 1184

Whistleblowing

Last Update:

Prateek (2001). "PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval" (PDF). USENIX Security Symposium. Retrieved 10 April 2015....

Word Count : 18104

Pir

Last Update:

thermal insulation Private information retrieval, a protocol for retrieving data without revealing what was retrieved Protein Information Resource, database...

Word Count : 320

Cryptovirology

Last Update:

the victim's data. Cryptovirology also encompasses the use of private information retrieval (PIR) to allow cryptoviruses to search for and steal host data...

Word Count : 1453

Information technology

Last Update:

'information technology' was appropriate to describe the convergence of technologies with application in the vast field of data storage, retrieval, processing...

Word Count : 4123

Benny Chor

Last Update:

cryptography, including traitor tracing, randomness extractors, private information retrieval, the security level and single-bit security of RSA encryption...

Word Count : 356

Virtual private network

Last Update:

remote locations over the open Internet. To prevent disclosure of private information or data sniffing, VPNs typically allow only authenticated remote...

Word Count : 3697

Patent Application Information Retrieval

Last Update:

Patent Application Information Retrieval (PAIR) is an online service provided by the United States Patent and Trademark Office to allow users to see the...

Word Count : 406

Cryptographic primitive

Last Update:

from many users to anonymize what came from whom Private information retrieval—get database information without server knowing which item was requested...

Word Count : 814

Information science

Last Update:

Information science is an academic field which is primarily concerned with analysis, collection, classification, manipulation, storage, retrieval, movement...

Word Count : 5574

List of cryptographers

Last Update:

Rafail Ostrovsky, co-inventor of Oblivious RAM, of single-server Private Information Retrieval, and proactive cryptosystems. Pascal Paillier, inventor of Paillier...

Word Count : 2349

Ciox Health

Last Update:

analytics, medical record retrieval, data aggregation, and risk adjustment coding. "CIOX Health: Private Company Information - Bloomberg". www.bloomberg...

Word Count : 206

Information

Last Update:

information retrieval, intelligence gathering, plagiarism detection, pattern recognition, anomaly detection and even art creation. Often information can...

Word Count : 5067

Library and information science

Last Update:

well-established information science areas Knowledge organization Library studies Information architecture Information behavior Interactive information retrieval Information...

Word Count : 5372

Binary decision diagram

Last Update:

tree analysis, Bayesian reasoning, product configuration, and private information retrieval.[citation needed] Every arbitrary BDD (even if it is not reduced...

Word Count : 2937

Index of cryptography articles

Last Update:

steganography • Privacy-enhanced Electronic Mail • Private Communications Technology • Private information retrieval • Probabilistic encryption • Product cipher...

Word Count : 2943

Certificate revocation

Last Update:

responses, CAs may be incentivised to deploy Let's Revoke. Private information retrieval techniques can allay the privacy concern with pull-based checks...

Word Count : 3599

Pick operating system

Last Update:

storage and retrieval efficiency for specific kinds of datasets. Pick was originally implemented as the Generalized Information Retrieval Language System...

Word Count : 3386

Information management

Last Update:

Information management (IM) is the appropriate and optimized capture, storage, retrieval, and use of information. It may be personal information management...

Word Count : 3586

PubMed

Last Update:

of Health maintains the database as part of the Entrez system of information retrieval. From 1971 to 1997, online access to the MEDLINE database had been...

Word Count : 3835

Distributed point function

Last Update:

distributed point function is known, then it is possible to perform private information retrieval. As a simplified example of this, it is possible to test whether...

Word Count : 482

PDF Search Engine © AllGlobal.net