Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security 2017
DOI: 10.1145/3133956.3134008
|View full text |Cite
|
Sign up to set email alerts
|

Querying for Queries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
2

Relationship

1
6

Authors

Journals

citations
Cited by 8 publications
(13 citation statements)
references
References 14 publications
0
13
0
Order By: Relevance
“…By default, Hafiz-Henry assumes users fetch records via positional queries [23]; that is, via their row numbers within D. We remark that (i) the DPFs naturally support keyword-based queries [12] as a more user-friendly alternative and (ii) this extension "plays well" with Hafiz-Henry queries. Beyond the preceding remark, we do not concern ourselves with how users specify which records they seek (though we do consider a candidate user interface in Section 9); however, we do prescribe one minor change to Hafiz-Henry query generation in support of PIRSONA functionality: The DeMUX assumes a so-called leafless seed for the "least-significant-bit" DPF (see §6.3) and, consequently, that the servers substitute the bit vector flags([[(j,…”
Section: Query Representationmentioning
confidence: 98%
“…By default, Hafiz-Henry assumes users fetch records via positional queries [23]; that is, via their row numbers within D. We remark that (i) the DPFs naturally support keyword-based queries [12] as a more user-friendly alternative and (ii) this extension "plays well" with Hafiz-Henry queries. Beyond the preceding remark, we do not concern ourselves with how users specify which records they seek (though we do consider a candidate user interface in Section 9); however, we do prescribe one minor change to Hafiz-Henry query generation in support of PIRSONA functionality: The DeMUX assumes a so-called leafless seed for the "least-significant-bit" DPF (see §6.3) and, consequently, that the servers substitute the bit vector flags([[(j,…”
Section: Query Representationmentioning
confidence: 98%
“…The user then performs a component-wise secret reconstruction using the responses received from the servers to obtain the desired block of data. Following in the footsteps of [7], we select Shamir's secret sharing scheme [17] as proposed in Goldberg's IT-PIR protocol [28] as our choice of linear secret sharing scheme. Shamir's (t + 1, ℓ)-threshold scheme in the vector-matrix model ensures that the user obtains their desired results as long as t + 1 or more servers out of ℓ respond.…”
Section: A Vector-matrix Pir Modelmentioning
confidence: 99%
“…Our protocol exploits the concept of indexes of queries introduced in Hafiz-Henry's protocol. The protocol introduced in [7] utilizes indexes of queries to support expressive queries that utilize contextual information rather than positional information to fetch relevant data blocks. Although Chor et al [30] introduced a scheme for keyword-based querying that translates keyword searches into positional queries, is comparable but with multiple rounds of interactions, [7]'s index of queries mechanism was more suitable for our protocol since it requires a single round of interaction to fetch the data, thus minimizing communication costs.…”
Section: A Vector-matrix Pir Modelmentioning
confidence: 99%
See 2 more Smart Citations