Results 11 to 20 of about 251,490 (326)

Bandwidth-optimized parallel private information retrieval [PDF]

open access: yesProceedings of the 7th International Conference on Security of Information and Networks, 2014
We present improved and parallel versions of Lipmaa’s computationally-private information retrieval (CPIR) protocol based on a additively-homomorphic cryptosystem.
Savaş, Erkay, Ünal, Ecem
core   +3 more sources

Private Information Retrieval with Private Noisy Side Information [PDF]

open access: greenIEEE Transactions on Information Theory, 2023
Consider Private Information Retrieval (PIR), where a client wants to retrieve one file out of $K$ files that are replicated in $N$ different servers and the client selection must remain private when up to $T$ servers may collude. Additionally, suppose that the client has noisy side information about each of the $K$ files, and the side information ...
Hassan ZivariFard, Rémi A. Chou
openalex   +3 more sources

Efficiency of a smart parking system in privacy-preserving using multi transaction mode consortium blockchain [PDF]

open access: yesScientific Reports
The vehicle drivers pose a huge problem in determining an optimal parking space as the density of vehicles in big cities have rapidly increased over the recent years.
Amu Durairaj   +6 more
doaj   +2 more sources

Weakly-Private Information Retrieval [PDF]

open access: green2019 IEEE International Symposium on Information Theory (ISIT), 2019
Private information retrieval (PIR) protocols make it possible to retrieve a file from a database without disclosing any information about the identity of the file being retrieved. These protocols have been rigorously explored from an information-theoretic perspective in recent years.
Hsuan-Yin Lin   +4 more
openalex   +4 more sources

On the Storage–Communication Trade-Off in Graph-Based X-Secure T-Private Linear Computation [PDF]

open access: yesEntropy
The problem of graph-based X-secure T-private linear computation (GXSTPLC) is to allow a user to retrieve a linear combination of K messages from a set of N distributed servers that store the messages in a graph-based fashion, i.e., each message is ...
Yueyang Liu, Haobo Jia, Zhuqing Jia
doaj   +2 more sources

Private Information Retrieval With Side Information [PDF]

open access: yesIEEE Transactions on Information Theory, 2020
Shorter version of the paper is accepted in Allerton Conference ...
Swanand Kadhe   +4 more
openaire   +2 more sources

Semantic Private Information Retrieval [PDF]

open access: yesIEEE Transactions on Information Theory, 2022
submitted for ...
Sajani Vithana   +2 more
openaire   +2 more sources

Timely Private Information Retrieval [PDF]

open access: yes2021 IEEE International Symposium on Information Theory (ISIT), 2021
Accepted for presentation in ISIT ...
Banawan, Karim   +2 more
openaire   +2 more sources

Proxy-Terms Based Query Obfuscation Technique for Private Web Search

open access: yesIEEE Access, 2022
Search engines store users’ queries in a query log for performing personalized information retrieval. However, query logs cause privacy concerns and reveal a lot of information about individuals if used against them.
Shariq Bashir   +2 more
doaj   +1 more source

COMPUTATIONALLY EFFICIENT PRIVATE INFORMATION RETRIEVAL PROTOCOL [PDF]

open access: yesНаучно-технический вестник информационных технологий, механики и оптики, 2016
This paper describes a new computationally efficient private information retrieval protocol for one q-ary symbol retrieving. The main advantage of the proposed solution lies in a low computational complexity of information extraction procedure, as well ...
A. V. Afanasyeva, S. V. Bezzateev
doaj   +1 more source

Home - About - Disclaimer - Privacy