Fully malicious authenticated PIR
Authenticated PIR enables a server to initially commit to a database of N items, for which a
client can later privately obtain individual items with complexity sublinear in N, with the …
client can later privately obtain individual items with complexity sublinear in N, with the …
ThorPIR: Single server PIR via homomorphic thorp shuffles
B Fisch, A Lazzaretti, Z Liu… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Private Information Retrieval (PIR) is a two player protocol where the client, given some
query x ε [N], interacts with the server, which holds a N-bit string DB, in order to privately …
query x ε [N], interacts with the server, which holds a N-bit string DB, in order to privately …
PRSD: Efficient protocol for privacy-preserving retrieval of sensitive data based on labeled PSI
The demand for privacy-preserving retrieval of sensitive data arises in various practical
scenarios, from national security to personal data privacy. The typical scenario involves two …
scenarios, from national security to personal data privacy. The typical scenario involves two …
Private approximate nearest neighbor search with sublinear communication
S Servan-Schreiber, S Langowski… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nearest neighbor search is a fundamental building-block for a wide range of applications. A
privacy-preserving protocol for nearest neighbor search involves a set of clients who send …
privacy-preserving protocol for nearest neighbor search involves a set of clients who send …
Realizing flexible broadcast encryption: How to broadcast to a public-key directory
Suppose a user wants to broadcast an encrypted message to K recipients. With public-key
encryption, the sender would construct K different ciphertexts, one for each recipient. The …
encryption, the sender would construct K different ciphertexts, one for each recipient. The …
Single server pir via homomorphic thorp shuffles
B Fisch, A Lazzaretti, Z Liu… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Private Information Retrieval (PIR) is a two player protocol where the client, given
some query $ x\in [N] $ interacts with the server, which holds a $ N $-bit string $\textsf {DB} …
some query $ x\in [N] $ interacts with the server, which holds a $ N $-bit string $\textsf {DB} …
VeriSimplePIR: verifiability in simplePIR at no online cost for honest servers
L de Castro, K Lee - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We present VeriSimplePIR, a verifiable version of the state-of-the-art semi-honest SimplePIR
protocol. VeriSimplePIR is a stateful verifiable PIR scheme guaranteeing that all queries are …
protocol. VeriSimplePIR is a stateful verifiable PIR scheme guaranteeing that all queries are …
Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage
Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in
geographic information systems, location-based services and other applications. It retrieves …
geographic information systems, location-based services and other applications. It retrieves …
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search
Motivated by secure database search, we present secure computation protocols for a
function f in the client-servers setting, where a client can obtain f (x) on a private input x by …
function f in the client-servers setting, where a client can obtain f (x) on a private input x by …
Efficient private information retrievals for IoT data based on bucket tree
The extensive proliferation of terminal devices poses challenges to the responsiveness of
various Internet of Things (IoT) services, particularly regarding privacy protection. Traditional …
various Internet of Things (IoT) services, particularly regarding privacy protection. Traditional …