2017
DOI: 10.1007/978-3-319-70503-3_23
|View full text |Cite
|
Sign up to set email alerts
|

Towards Doubly Efficient Private Information Retrieval

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
1

Year Published

2018
2018
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(15 citation statements)
references
References 17 publications
0
14
1
Order By: Relevance
“…ORAM and its multiple client extensions do not provide practical solutions for enabling access to large groups of clients efficiently and privately compared to PSIR. [23,24,44] ✓ ✓ ✓ Multiple Client ORAM [34,38,39,50] ✓ ✓ ✓ ✓ Symmetric-Key DEPIR [12,15] ✓ Public-Key DEPIR [12] ✓ ✓ PANDA [28] ✓ ✓ ✓ Table 1: This table compares single-server privacy-preserving storage systems. Multiple client access refers to systems that enable accessibility to large groups of clients while providing privacy against subsets of colluding clients.…”
Section: Relation To Other Privacy-preserving Storage Primitivesmentioning
confidence: 99%
See 1 more Smart Citation
“…ORAM and its multiple client extensions do not provide practical solutions for enabling access to large groups of clients efficiently and privately compared to PSIR. [23,24,44] ✓ ✓ ✓ Multiple Client ORAM [34,38,39,50] ✓ ✓ ✓ ✓ Symmetric-Key DEPIR [12,15] ✓ Public-Key DEPIR [12] ✓ ✓ PANDA [28] ✓ ✓ ✓ Table 1: This table compares single-server privacy-preserving storage systems. Multiple client access refers to systems that enable accessibility to large groups of clients while providing privacy against subsets of colluding clients.…”
Section: Relation To Other Privacy-preserving Storage Primitivesmentioning
confidence: 99%
“…The first public-key DEPIR construction was presented by Beimel et al [9] in the multiple, non-colluding server setting that is information-theoretically secure. More recently, Boyle et al [12] and Canetti et al [15] present symmetric-key DEPIR schemes in the single-server setting using locally decodable codes built from Reed-Muller codes [42,46]. In addition, Boyle et al…”
Section: Doubly Efficient Pir Doubly Efficient Pir (Depir) Refers Tomentioning
confidence: 99%
“…The second proposal described by Beimel et al [16] is to preprocess the database in certain IT-PIR schemes to reduce the cost of future queries. Since this works well, recent projects [19,26] employ an analogous approach in CPIR schemes. However, making the preprocessed database accessible by more than one client under these schemes requires cryptographic primitives that are currently too inefficient to be implemented (virtual black-box obfuscation [14] heuristically instantiated from indistinguishability obfuscation [43]).…”
Section: Existing Multi-query Pir Schemesmentioning
confidence: 99%
“…Hence we say a PIR protocol is non-trivial if it is communicationwise better than the trivial solution. In the literature, many efficient PIR protocols have been proposed, either in singleserver setting [2,3], or in multi-server setting [12,14,21]. As for the second question, similarly, we say a secure submodel aggregation protocol is non-trivial if it is concretely better than the full model secure aggregation protocol in terms of communication.…”
Section: Introductionmentioning
confidence: 99%
“…Existing solutions [5,23,26,37] leverages different tools, i.e. Differential Privacy (DP) [18,36], Multi-Party Computation (MPC) [15] or PIR [2,3,12,14,21]. However, some work [23,26] consider only the non-adaptive case, where each client selects a fixed submodel prior to the training.…”
Section: Introductionmentioning
confidence: 99%