2017
DOI: 10.1093/comjnl/bxx025
|View full text |Cite
|
Sign up to set email alerts
|

A New Method for Computational Private Information Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 2 publications
0
4
0
Order By: Relevance
“…Lipmaa's BddCPIR is not the only tree‐based CPIR scheme in the literature; the protocol can easily be generalized to larger databases and other types of trees, which employ a multi‐exponentation for each internal node in the tree with the same number of bases and exponents. Furthermore, there exist approaches employing different labels, which are shown to be more efficient in terms of bandwidth usage …”
Section: Notation and Backgroundmentioning
confidence: 99%
See 3 more Smart Citations
“…Lipmaa's BddCPIR is not the only tree‐based CPIR scheme in the literature; the protocol can easily be generalized to larger databases and other types of trees, which employ a multi‐exponentation for each internal node in the tree with the same number of bases and exponents. Furthermore, there exist approaches employing different labels, which are shown to be more efficient in terms of bandwidth usage …”
Section: Notation and Backgroundmentioning
confidence: 99%
“…These techniques are analyzed and improved on other studies, eg, the work of Möller . Our work is based on Lim and Lee's multi‐exponentiation method that uses pre‐computation, which we employed for faster privacy preserving query processing without any parallelization.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations