Querying twice to achieve information-theoretic verifiability in private information retrieval
Private Information Retrieval (PIR) protocols allow a client to retrieve any file of interest while keeping the files identity hidden from the database servers. While many existing PIR protocols assume servers to be honest but curious, we investigate the scenario of dishonest servers that provide in...
Saved in:
Main Authors: | Kruglik, Stanislav, Dau, Son Hoang, Kiah, Han Mao, Wang, Huaxiong, Zhang, Liang Feng |
---|---|
Other Authors: | School of Physical and Mathematical Sciences |
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/180554 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Provably secure symmetric private information retrieval with quantum cryptography
by: Kon, Wen Yu, et al.
Published: (2022) -
Private queries in location based services: Anonymizers are not necessary
by: Ghinita, G., et al.
Published: (2013) -
Verifiable coded computation of multiple functions
by: Kim, Wilton, et al.
Published: (2024) -
Collaborative querying for enhanced information retrieval.
by: Fu, Lin.
Published: (2008) -
Collaborative querying for enhanced information retrieval
by: Fu, Lin, et al.
Published: (2010)