Optimal single-server private information retrieval
From MaRDI portal
Publication:6138096
DOI10.1007/978-3-031-30545-0_14OpenAlexW4365936297MaRDI QIDQ6138096
Yiannis Tselekounis, Elaine Shi, Mingxun Zhou, Wei-Kai Lin
Publication date: 16 January 2024
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-031-30545-0_14
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Sorting in \(c \log n\) parallel steps
- Private constrained PRFs (and more) from LWE
- Can we access a database both locally and privately?
- Towards doubly efficient private information retrieval
- Privately constraining and programming PRFs, the LWE way
- Private information retrieval with sublinear online time
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time
- Lightweight, maliciously secure verifiable function secret sharing
- Single-server private information retrieval with sublinear amortized time
- Private anonymous data access
- Universal service-providers for database private information retrieval (extended abstract)
- Spooky Encryption and Its Applications
- Spooky Interaction and Its Discontents: Compilers for Succinct Two-Message Argument Systems
- Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based
- 2-Server PIR with Sub-Polynomial Communication
- Private information retrieval
- Batch codes and their applications
- Fully homomorphic encryption using ideal lattices
- Modified ranks of tensors and the size of circuits
- Information Security and Privacy
- Distributed Point Functions and Their Applications
- Delegation for bounded space
- Automata, Languages and Programming
- Constraining Pseudorandom Functions Privately
- Private Puncturable PRFs from Standard Lattice Assumptions
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- Watermarking cryptographic functionalities from standard lattice assumptions
- Programmable distributed point functions
This page was built for publication: Optimal single-server private information retrieval