Private Information Retrieval [electronic resource] / by Xun Yi, Russell Paulet, Elisa Bertino.
By: Yi, Xun [author.].
Contributor(s): Paulet, Russell [author.] | Bertino, Elisa [author.] | SpringerLink (Online service).
Material type: BookSeries: Synthesis Lectures on Information Security, Privacy, and Trust: Publisher: Cham : Springer International Publishing : Imprint: Springer, 2013Edition: 1st ed. 2013.Description: XV, 98 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783031023378.Subject(s): Data protection | Data and Information SecurityAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.8 Online resources: Click here to access onlinePreface -- Acknowledgments -- Classic Private Information Retrieval -- FHE-Based Private Information Retrieval -- Private Data Warehouse Queries -- Privacy-Preserving Location-Based Queries -- Discussion and Future Work -- Bibliography -- Authors' Biographies.
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques,this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.
There are no comments for this item.