Yi, Xun.
Private Information Retrieval [electronic resource] / by Xun Yi, Russell Paulet, Elisa Bertino. - 1st ed. 2013. - XV, 98 p. online resource. - Synthesis Lectures on Information Security, Privacy, and Trust, 1945-9750 . - Synthesis Lectures on Information Security, Privacy, and Trust, .
Preface -- Acknowledgments -- Classic Private Information Retrieval -- FHE-Based Private Information Retrieval -- Private Data Warehouse Queries -- Privacy-Preserving Location-Based Queries -- Discussion and Future Work -- Bibliography -- Authors' Biographies.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques,this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.
9783031023378
10.1007/978-3-031-02337-8 doi
Data protection.
Data and Information Security.
QA76.9.A25
005.8
Private Information Retrieval [electronic resource] / by Xun Yi, Russell Paulet, Elisa Bertino. - 1st ed. 2013. - XV, 98 p. online resource. - Synthesis Lectures on Information Security, Privacy, and Trust, 1945-9750 . - Synthesis Lectures on Information Security, Privacy, and Trust, .
Preface -- Acknowledgments -- Classic Private Information Retrieval -- FHE-Based Private Information Retrieval -- Private Data Warehouse Queries -- Privacy-Preserving Location-Based Queries -- Discussion and Future Work -- Bibliography -- Authors' Biographies.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques,this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.
9783031023378
10.1007/978-3-031-02337-8 doi
Data protection.
Data and Information Security.
QA76.9.A25
005.8