搜索结果: 1-15 共查到“军队指挥学 pir”相关记录17条 . 查询时间(0.046 秒)
WIDESEAS: A lattice-based PIR scheme implemented in EncryptedQuery
Private Information Retrieval PIR homomorphic encryption
2019/7/24
We introduce the WIDESEAS protocol for lattice-based Private Information Retrieval (PIR), and we give performance numbers for its recent implementation in the EncryptedQuery open-source PIR software. ...
Homomorphic encryption (HE) is often viewed as impractical, both in communication and computation. Here we provide an additively homomorphic encryption scheme based on (ring) LWE with nearly optimal r...
How to Correct Errors in Multi-Server PIR
Private Information Retrieval information theoretic error correcting
2019/5/22
Suppose that there exist a user and ℓ servers S1,…,Sℓ. Each server Sj holds a copy of a database x=(x1,…,xn)∈{0,1}n, and the user holds a secret index i0∈{1,…,n}. A b error correcting T...
On Quantum Advantage in Information Theoretic Single-Server PIR
quantum complexity private information retrieval specious security
2019/3/4
In (single-server) Private Information Retrieval (PIR), a server holds a large database DBDB of size nn, and a client holds an index i∈[n]i∈[n] and wishes to retrieve DB[i]DB[i] without revealing ii t...
An important initialization step in many social-networking applications is contact discovery, which allows a user of the service to identify which of its existing social contacts also use the service....
Oblivious Dynamic Searchable Encryption via Distributed PIR and ORAM
Privacy Enhancing Technologies Searchable Encryption Oblivious Random Access Machine (ORAM)
2017/11/30
Dynamic Searchable Symmetric Encryption (DSSE) allows to delegate search/update operations over encrypted data via an encrypted index. However, DSSE is known to be vulnerable against statistical infer...
PIR with compressed queries and amortized computation
cryptographic protocols private information retrieval
2017/11/28
Private information retrieval (PIR) is a key building block in many privacy-preserving systems. Unfortunately, existing constructions remain very expensive. This paper introduces two complementary tec...
Querying for Queries: Indexes of Queries for Efficient and Expressive IT-PIR
Private information retrieval expressive queries batch codes
2017/9/1
We propose indexes of queries, a novel mechanism for supporting efficient, expressive, and information-theoretically private single-round queries over multi-server PIR databases. Our approach decouple...
Constant bandwidth ORAM with small block size using PIR operations
ORAM constant communication overhead oblivious clear algorithm
2017/6/22
Recently, server-with-computation model has been applied in Oblivious RAM scheme to achieve constant communication (constant number of blocks). However, existing works either result in large block siz...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted client to outsource storage to an untrusted server while hiding the client's memory access patterns to the server. The last thre...
Polynomial Batch Codes for Efficient IT-PIR
Private information retrieval batch codes batch queries
2016/6/8
Private information retrieval (PIR) is a way for clients to query a remote database without the database holder learning the clients' query terms or the responses they generate. Compelling application...
Non-Interactive RAM and Batch NP Delegation from any PIR
Delegation No-Signaling Adaptive Soundness
2016/5/17
We present an adaptive and non-interactive protocol for verifying arbitrary efficient computations in fixed polynomial time. Our protocol is computationally sound and can be based on any computational...
KT-ORAM: A Bandwidth-efficient ORAM Built on K-ary Tree of PIR Nodes
Cloud storage Access pattern privacy Oblivious RAM
2016/1/8
This paper proposes KT-ORAM, a new hybrid ORAM-PIR construction, to protect a client's access pattern to outsourced data. KT-ORAM organizes the server storage as a k-ary tree with each node acting as ...
Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR
Homomorphic encryption Private information retrieval Cryptanalysis
2016/1/5
Private Information Retrieval (PIR) protects users' privacy in outsourced storage applications and can be achieved using additively homomorphic encryption schemes. Several PIR schemes with a “real wor...
Efficient Private File Retrieval by Combining ORAM and PIR
private information retrieval oblivious ram
2013/4/18
Recent research results on “bucketed” Oblivious RAM by Shi et al. [12] reduce communication for an N-capacity storage with blocks of size l bits to poly-logarithmic complexity O(l · log^3(N)) in the w...