000 | 03508nam a22005055i 4500 | ||
---|---|---|---|
001 | 978-3-031-02337-8 | ||
003 | DE-He213 | ||
005 | 20240730163907.0 | ||
007 | cr nn 008mamaa | ||
008 | 220601s2013 sz | s |||| 0|eng d | ||
020 |
_a9783031023378 _9978-3-031-02337-8 |
||
024 | 7 |
_a10.1007/978-3-031-02337-8 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aUTN _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
072 | 7 |
_aUTN _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
100 | 1 |
_aYi, Xun. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981073 |
|
245 | 1 | 0 |
_aPrivate Information Retrieval _h[electronic resource] / _cby Xun Yi, Russell Paulet, Elisa Bertino. |
250 | _a1st ed. 2013. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2013. |
|
300 |
_aXV, 98 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 |
|
505 | 0 | _aPreface -- Acknowledgments -- Classic Private Information Retrieval -- FHE-Based Private Information Retrieval -- Private Data Warehouse Queries -- Privacy-Preserving Location-Based Queries -- Discussion and Future Work -- Bibliography -- Authors' Biographies. | |
520 | _aThis book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques,this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. | ||
650 | 0 |
_aData protection. _97245 |
|
650 | 1 | 4 |
_aData and Information Security. _931990 |
700 | 1 |
_aPaulet, Russell. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981074 |
|
700 | 1 |
_aBertino, Elisa. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut _981075 |
|
710 | 2 |
_aSpringerLink (Online service) _981076 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783031012099 |
776 | 0 | 8 |
_iPrinted edition: _z9783031034657 |
830 | 0 |
_aSynthesis Lectures on Information Security, Privacy, and Trust, _x1945-9750 _981077 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-031-02337-8 |
912 | _aZDB-2-SXSC | ||
942 | _cEBK | ||
999 |
_c85100 _d85100 |