Fully malicious authenticated PIR

M Dietz, S Tessaro - Annual International Cryptology Conference, 2024 - Springer
Authenticated PIR enables a server to initially commit to a database of N items, for which a
client can later privately obtain individual items with complexity sublinear in N, with the …

ThorPIR: Single server PIR via homomorphic thorp shuffles

B Fisch, A Lazzaretti, Z Liu… - Proceedings of the 2024 on …, 2024 - dl.acm.org
Private Information Retrieval (PIR) is a two player protocol where the client, given some
query x ε [N], interacts with the server, which holds a N-bit string DB, in order to privately …

PRSD: Efficient protocol for privacy-preserving retrieval of sensitive data based on labeled PSI

Z Wu, D Zhang, Y Li, C Li, X Han - Computer Networks, 2024 - Elsevier
The demand for privacy-preserving retrieval of sensitive data arises in various practical
scenarios, from national security to personal data privacy. The typical scenario involves two …

Private approximate nearest neighbor search with sublinear communication

S Servan-Schreiber, S Langowski… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nearest neighbor search is a fundamental building-block for a wide range of applications. A
privacy-preserving protocol for nearest neighbor search involves a set of clients who send …

Realizing flexible broadcast encryption: How to broadcast to a public-key directory

R Garg, G Lu, B Waters, DJ Wu - Proceedings of the 2023 ACM SIGSAC …, 2023 - dl.acm.org
Suppose a user wants to broadcast an encrypted message to K recipients. With public-key
encryption, the sender would construct K different ciphertexts, one for each recipient. The …

Single server pir via homomorphic thorp shuffles

B Fisch, A Lazzaretti, Z Liu… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Private Information Retrieval (PIR) is a two player protocol where the client, given
some query $ x\in [N] $ interacts with the server, which holds a $ N $-bit string $\textsf {DB} …

VeriSimplePIR: verifiability in simplePIR at no online cost for honest servers

L de Castro, K Lee - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We present VeriSimplePIR, a verifiable version of the state-of-the-art semi-honest SimplePIR
protocol. VeriSimplePIR is a stateful verifiable PIR scheme guaranteeing that all queries are …

Beyond Result Verification: Efficient Privacy-Preserving Spatial Keyword Query With Suppressed Leakage

Q Tong, X Li, Y Miao, Y Wang, X Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Boolean range query (BRQ) is a typical type of spatial keyword query that is widely used in
geographic information systems, location-based services and other applications. It retrieves …

Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search

R Eriguchi, K Kurosawa, K Nuida - … on the Theory and Applications of …, 2024 - Springer
Motivated by secure database search, we present secure computation protocols for a
function f in the client-servers setting, where a client can obtain f (x) on a private input x by …

Efficient private information retrievals for IoT data based on bucket tree

J Sun, F Zhou, Q Wang, Z Jiao, Y Zhang - Computers and Electrical …, 2024 - Elsevier
The extensive proliferation of terminal devices poses challenges to the responsiveness of
various Internet of Things (IoT) services, particularly regarding privacy protection. Traditional …