1999
DOI: 10.1007/3-540-48910-x_28
|View full text |Cite
|
Sign up to set email alerts
|

Computationally Private Information Retrieval with Polylogarithmic Communication

Abstract: We present a single-database computationally private information retrieval scheme with polylogarithmic communication complexity. Our construction is based on a new, but reasonable intractability assumption, which we call the Φ-Hiding Assumption (ΦHA): essentially the difficulty of deciding whether a small prime divides φ(m), where m is a composite integer of unknown factorization.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
452
0
1

Year Published

1999
1999
2016
2016

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 454 publications
(453 citation statements)
references
References 16 publications
0
452
0
1
Order By: Relevance
“…The following theorem relates the complexity of privately computing a functionality g to the circuit size of g. Theorem 2.1 ([54,27,3]). Let C = {C n } be a uniform family of (deterministic or probabilistic 7 8 A similar statement holds also when the adversary is active [39,34,49].…”
Section: Secure Multiparty Computationmentioning
confidence: 82%
See 1 more Smart Citation
“…The following theorem relates the complexity of privately computing a functionality g to the circuit size of g. Theorem 2.1 ([54,27,3]). Let C = {C n } be a uniform family of (deterministic or probabilistic 7 8 A similar statement holds also when the adversary is active [39,34,49].…”
Section: Secure Multiparty Computationmentioning
confidence: 82%
“…The receiver outputs the bit x i , and the sender has no output. if stronger cryptographic assumptions are made, in this case specific number-theoretic assumptions from [7,41,22]. We refer the reader to the above papers for a more concrete analysis of the complexity tradeoffs and to [21] for a general survey of PIR protocols.…”
Section: Definition 2 (Oblivious Transfer)mentioning
confidence: 99%
“…All known PIR protocols realization can be divided into two classes: single-server protocols (see [2][3][4][5][6][7][8][9][10]) and multi-servers ones (see [11][12][13][14]). …”
Section: Existing Schemesmentioning
confidence: 99%
“…On the other hand, PIR schemes do not protect the owner of the database and do not prevent the user from learning more than a single element. The first constructions of PIR schemes were based on using separate databases which do not communicate, but more recent constructions [20,5] use only a single database. More recently attention was given to the question of protecting the database as well, i.e.…”
Section: Comparison To Private Information Retrieval (Pir)mentioning
confidence: 99%
“…For many applications the communication in the initialization phase is not an issue, and can be done using devices such as DVD's, jaz drives, or a fast communication network. In contrast, single server PIR protocols [20,5] are very costly to implement since each transfer requires O(N ) exponentiations (which must be done after the receiver sends her query).…”
Section: Comparison To Private Information Retrieval (Pir)mentioning
confidence: 99%