Academic literature on the topic 'Private information retrieval (PIR)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Private information retrieval (PIR).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Private information retrieval (PIR)"
ANDRIU, Adrian-Viorel. "PIR – Private Information Retrieval." Romanian Cyber Security Journal 4, no. 2 (2022): 65–70. http://dx.doi.org/10.54851/v4i2y202207.
Full textToledo, Raphael R., George Danezis, and Ian Goldberg. "Lower-Cost ∈-Private Information Retrieval." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (2016): 184–201. http://dx.doi.org/10.1515/popets-2016-0035.
Full textAguilar-Melchor, Carlos, Joris Barrier, Laurent Fousse, and Marc-Olivier Killijian. "XPIR : Private Information Retrieval for Everyone." Proceedings on Privacy Enhancing Technologies 2016, no. 2 (2016): 155–74. http://dx.doi.org/10.1515/popets-2016-0010.
Full textVaidya, Kanishak, and Balaji Sundar Rajan. "Multi-User PIR with Cyclic Wraparound Multi-Access Caches." Entropy 25, no. 8 (2023): 1228. http://dx.doi.org/10.3390/e25081228.
Full textPaskin-Cherniavsky, Anat, and Leora Schmerler. "On Share Conversions for Private Information Retrieval." Entropy 21, no. 9 (2019): 826. http://dx.doi.org/10.3390/e21090826.
Full textKrishnan K. H., Murali, and Jagadeesh Harshan. "On the Existence of XOR-Based Codes for Private Information Retrieval with Private Side Information." Entropy 23, no. 10 (2021): 1287. http://dx.doi.org/10.3390/e23101287.
Full textLuo, Ming, and Mingsheng Wang. "Faster Spiral: Low-Communication, High-Rate Private Information Retrieval." Cryptography 9, no. 1 (2025): 13. https://doi.org/10.3390/cryptography9010013.
Full textVithana, Sajani, and Sennur Ulukus. "Deceptive Information Retrieval." Entropy 26, no. 3 (2024): 244. http://dx.doi.org/10.3390/e26030244.
Full textAhmad, Ishtiyaque, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta. "Private Information Retrieval in Large Scale Public Data Repositories." Proceedings of the VLDB Endowment 16, no. 12 (2023): 3868–71. http://dx.doi.org/10.14778/3611540.3611572.
Full textWei, Yi-Peng, Batuhan Arasli, Karim Banawan, and Sennur Ulukus. "The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases." Information 10, no. 12 (2019): 372. http://dx.doi.org/10.3390/info10120372.
Full textDissertations / Theses on the topic "Private information retrieval (PIR)"
Miceli, Michael. "Private Information Retrieval in an Anonymous Peer-to-Peer Environment." ScholarWorks@UNO, 2011. http://scholarworks.uno.edu/td/1331.
Full textDuguépéroux, Joris. "Protection des travailleurs dans les plateformes de crowdsourcing : une perspective technique." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S023.
Full textMalek, Behzad. "Efficient private information retrieval." Thesis, University of Ottawa (Canada), 2005. http://hdl.handle.net/10393/26966.
Full textMeyer, Pierre. "Sublinear-communication secure multiparty computation." Electronic Thesis or Diss., Université Paris Cité, 2023. http://www.theses.fr/2023UNIP7129.
Full textYekhanin, Sergey. "Locally Decodable Codes and Private Information Retrieval Schemes." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42242.
Full textLiu, Tianren S. M. Massachusetts Institute of Technology. "On basing private information retrieval on NP-hardness." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106093.
Full textLincoln, Laura Beth. "Symmetric private information retrieval via additive homomorphic probabilistic encryption /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/2792.
Full textRaymond, Jean-Francois 1974. "Private information retrieval : improved upper bound, extension and applications." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=30830.
Full textZhou, Yanliang. "Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.
Full textAsonov, Dmitri. "Querying databases privately : a new approach to private information retrieval /." Berlin : Springer, 2004. http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3128.
Full textBooks on the topic "Private information retrieval (PIR)"
Yi, Xun, Russell Paulet, and Elisa Bertino. Private Information Retrieval. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02337-8.
Full textYekhanin, Sergey. Locally Decodable Codes and Private Information Retrieval Schemes. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14358-8.
Full textAhituv, Niv. Protecting statistical data bases against retrieval of private information. Tel Aviv University, Faculty of Management, Leon Recanati Graduate School of Business Administration, 1987.
Find full textAsonov, Dmitri. Querying databases privately: A new approach to private information retrieval. Springer, 2004.
Find full textMilbank Memorial Fund. Reforming States Group., ed. Public-private collaboration in health information policy. The Fund, 1999.
Find full textSigner, Daniel. Computer-Integriertes Private Banking (CIPB): Theoretische und empirische Untersuchung zum Wettbewerbsbeitrag neuer Informationstechnologien im schweizerischen Private Banking. Haupt, 1992.
Find full textJoint, OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford and Menlo Park Calif ). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. OECD, 1999.
Find full textJoint OECD-Private Sector Workshop on Electronic Authentication (1999 Stanford, Calif. and Menlo Park Calif.). Joint OECD-Private Sector Workshop on Electronic Authentication: Stanford and Menlo Park, California 2-4 June 1999. OECD, 1999.
Find full textCoblentz, Kathie. The New York Public Library guide to organizing a home library. Running Press, 2003.
Find full textSnowden, Barry L. Common terminology, definitions and classifications for system-wide information reporting: Prepared for colleges and technical institutes, private university colleges, universities and Advanced Education and Career Development. Alberta Advanced Education and Career Development, 1998.
Find full textBook chapters on the topic "Private information retrieval (PIR)"
Beimel, Amos, Yuval Ishai, and Tal Malkin. "Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing." In Advances in Cryptology — CRYPTO 2000. Springer Berlin Heidelberg, 2000. http://dx.doi.org/10.1007/3-540-44598-6_4.
Full textPark, Jeongeun, and Mehdi Tibouchi. "SHECS-PIR: Somewhat Homomorphic Encryption-Based Compact and Scalable Private Information Retrieval." In Computer Security – ESORICS 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-59013-0_5.
Full textYi, Xun. "Private Information Retrieval." In Encyclopedia of Database Systems. Springer New York, 2017. http://dx.doi.org/10.1007/978-1-4899-7993-3_80752-1.
Full textBlundo, Carlo. "Private Information Retrieval." In Encyclopedia of Cryptography and Security. Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_762.
Full textBlundo, Carlo. "Private Information Retrieval." In Encyclopedia of Cryptography, Security and Privacy. Springer Berlin Heidelberg, 2022. http://dx.doi.org/10.1007/978-3-642-27739-9_762-2.
Full textYekhanin, Sergey. "Private information retrieval." In Information Security and Cryptography. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14358-8_4.
Full textYi, Xun. "Private Information Retrieval." In Encyclopedia of Database Systems. Springer New York, 2018. http://dx.doi.org/10.1007/978-1-4614-8265-9_80752.
Full textBlundo, Carlo. "Private Information Retrieval." In Encyclopedia of Cryptography, Security and Privacy. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-030-71522-9_762.
Full textYi, Xun, Russell Paulet, and Elisa Bertino. "Privacy-Preserving Location-Based Queries." In Private Information Retrieval. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02337-8_4.
Full textYi, Xun, Russell Paulet, and Elisa Bertino. "Classic Private Information Retrieval." In Private Information Retrieval. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-031-02337-8_1.
Full textConference papers on the topic "Private information retrieval (PIR)"
ZivariFard, Hassan, Rémi A. Chou, and Xiaodong Wang. "The Capacity of Symmetric Private Information Retrieval with Private Noisy Side Information." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619115.
Full textErhili, Leila, and Anoosheh Heidarzadeh. "Achieving Capacity of PIR with Private Side Information with Low Sub-packetization and without MDS Codes." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619116.
Full textChen, Song, Haobo Jia, and Zhuqing Jia. "A Capacity Result on Weakly-Private Information Retrieval." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619671.
Full textHuang, Yu-Shin, Wenyuan Zhao, Ruida Zhou, and Chao Tian. "Weakly Private Information Retrieval from Heterogeneously Trusted Servers." In 2024 IEEE International Symposium on Information Theory (ISIT). IEEE, 2024. http://dx.doi.org/10.1109/isit57864.2024.10619321.
Full textRayer, Megha, Charul Rajput, and B. Sundar Rajan. "Single-Server Pliable Private Information Retrieval with Identifiable Side Information." In 2025 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2025. https://doi.org/10.1109/wcnc61545.2025.10978336.
Full textBitar, Rawad, and Salim El Rouayheb. "Staircase-PIR: Universally Robust Private Information Retrieval." In 2018 IEEE Information Theory Workshop (ITW). IEEE, 2018. http://dx.doi.org/10.1109/itw.2018.8613532.
Full textMayberry, Travis, Erik-Oliver Blass, and Agnes Hui Chan. "Efficient Private File Retrieval by Combining ORAM and PIR." In Network and Distributed System Security Symposium. Internet Society, 2014. http://dx.doi.org/10.14722/ndss.2014.23033.
Full textMadeira, André. "Approximate private information retrieval." In the 2nd SIGMOD PhD workshop. ACM Press, 2008. http://dx.doi.org/10.1145/1410308.1410319.
Full textPatel, Sarvar, Giuseppe Persiano, and Kevin Yeo. "Private Stateful Information Retrieval." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3243734.3243821.
Full textMozaffari, Hamid, and Amir Houmansadr. "Heterogeneous Private Information Retrieval." In Network and Distributed System Security Symposium. Internet Society, 2020. http://dx.doi.org/10.14722/ndss.2020.24363.
Full textReports on the topic "Private information retrieval (PIR)"
Jha, Somesh, Vitaly Shmatikov, and Matthew Fredrikson. Private Information Retrieval. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada536856.
Full textKagal, Lalana. Policy Compliance of Queries for Private Information Retrieval. Defense Technical Information Center, 2010. http://dx.doi.org/10.21236/ada533742.
Full textSaint-Jean, Felipe. Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cSPIR) Protocol. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada459016.
Full text