2013
DOI: 10.1007/978-3-642-39884-1_33
|View full text |Cite
|
Sign up to set email alerts
|

Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2013
2013
2016
2016

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Olumofin showed that Goldberg's system [20] can be one to three orders of magnitude faster than transferring the entire database. Cappos [3] also demonstrated that Chor's PIR scheme can be implemented with high computational efficiency and that its performance is similar to non-private protocols such as HTTP and FTP in practice.…”
Section: Related Workmentioning
confidence: 92%
See 4 more Smart Citations
“…Olumofin showed that Goldberg's system [20] can be one to three orders of magnitude faster than transferring the entire database. Cappos [3] also demonstrated that Chor's PIR scheme can be implemented with high computational efficiency and that its performance is similar to non-private protocols such as HTTP and FTP in practice.…”
Section: Related Workmentioning
confidence: 92%
“…Using fast XOR operations allows us to reuse the same high performance PIR mirror infrastructure that has been shown to have similar goodput to FTP on realistic datasets and deployment environments [3]. However, using multiple block requests has benefits over this existing PIR scheme.…”
Section: Introductionmentioning
confidence: 94%
See 3 more Smart Citations