Results 291 to 300 of about 251,490 (326)
Some of the next articles are maybe not open access.
Efficient private information retrieval
2013In this thesis, we study Private Information Retrieval and Oblivious Transfer, two strong cryptographic tools that are widely used in various security-related applications, such as private data-mining schemes and secure function evaluation protocols. The first non-interactive, secure dot-product protocol, widely used in private data-mining schemes, is ...
openaire +2 more sources
Cache-aided private information retrieval
2017 51st Asilomar Conference on Signals, Systems, and Computers, 2017We present a cache-aided private information retrieval (PIR) problem for a replication-based storage system, where a user caches parts of messages in advance. We propose a new PIR scheme from non-colluding databases with cached data at the user. The main idea of our scheme is to exploit cached data as a side information in a specific way to minimize ...
Minchul Kim, Heecheol Yang, Jungwoo Lee
openaire +1 more source
Private Information Retrieval over ICN
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016Private Information Retrieval (PIR) is a well-known cryptographic primitive: When accessing some database records, the database server (as well as any external observer also seeing requests and replies) should not be able to learn which record has been requested.
openaire +1 more source
Hypercubes and Private Information Retrieval
2018In geometry, a hypercube is a regular polytype – a generalisation of a 3-dimensional cube to \(\lambda \)-dimensions, with mutually perpendicular sides of equal lengths. For \(\lambda = 0, 1, 2, 3, \text {and}\,4\), a hypercube is a point, a straight line segment, a square, a cube and a tesseract respectively.
Anirban Basu +3 more
openaire +1 more source
Public and private blockchain in construction business process and information integration
Automation in Construction, 2020Ron Wakefield, Fengling Han, Xun Yi
exaly

