skip to main content
10.1145/301250.301275acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free Access

Improved upper bounds on information-theoretic private information retrieval (extended abstract)

Authors Info & Claims
Published:01 May 1999Publication History
First page image

References

  1. 1.M. Abadi, J. Feigenbaum, and J. Kili~. On hiding information from an oracle (extended abstract). In Proc. of 19th STOC, pages 195-203, 1987. Journal version ill JCSS vol 39 pp. 21-50, 1980.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.A. Ambainis. Upper bound on the communication complexity of private information retrieval. In Proc. of ~4th ICALP, volume 1256 of Lecture Notes in Computer Science, pages 401-407, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.D. Beaver and J. Feigenbaum. Hiding instances in multior~cle queries. In C. Choffrut and T. Lengauer, editors, STAOS '90, 7th Annu. Syrup. on Theoretical Aspects of Computer Science, volume 415 of/~cture Notes in Computer Science, pages 37-48. Springer- Verlag, 1990.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4.D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: Improvements and applications. $. of Cr~fptology, 10(1):17-36, 1997. Early version' Security with small communication overhead, CRYPTO '90, LNCS 537, pages 62-76.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.D. Beaver and A. Wool Quorum-based secure multiparty computation. In Proc. of EUROCRYPT'98, LNCS 1403, Springer Verlag, pages 375-390, 1998.]]Google ScholarGoogle Scholar
  6. 6.A. Beimel, Y. Ish~i, E. Kushilevitz, and T. Malkin. One-way functions are essential for single-server private information retrieval. In Proc. of the 31~h Annu. A CM SFrnp. on the Theor~ of Computing, 1999.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. 7.C. Cachin, S.Micali, and M. StaAler. Computationslly private information retrieval with polylogarithrnic communication. In Advancez in CrFptolog~l - E UROCR YPT '99, 1999.]]Google ScholarGoogle Scholar
  8. 8.B. Chor and N. (}ilboa. Computationally private informarion retriewl. In Proc. of ~9th $TOC, pages 304- 313, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of S6th FOES, pages 41-50, 1995. To appeaz in JACM.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. 10.R. Cramer, I. Damgard, and U. Maurer. Span programs and secure general multiparty computation. BKICS Report Series, B.S-97-28, 1997. Available from http://www.bdcs.dk.]]Google ScholarGoogle Scholar
  11. 11.G. Di Crescenzo, Y. Ishd, and R. Ostrovsky. Universal service-providers for database private information retrieval. In Pro~. of the 17th Annu. A CM Syrup. o~ Principles of Distributed Computing, pages 91-100, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Y. Gertner, S. Goldwazser, and T. Malkin. A random server model for private information retrieval (or how to achieve information theoretic PIR avoiding data replication). In Proc. of l~nd RANDOM, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. 13.Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. In Proc. of the 30th A nnu. A CM Syrup. on the Theory of Computing, pages 151-160, 1998.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. 14.M. Ito, A. Saito, and T. Nishizeki. Secret sharing schemes realizing general access structures. In Proc. IEEE Global Telecommunication Conf., Globecorn 87, pages 99-102, 1987.]]Google ScholarGoogle Scholar
  15. 15.E. Kushilevitz and R. Ostrovsky. Replication is not needed: Single database, computationally-private infoimation retrieval. In Proc. of the $8th A nnu. IEEE $yrnp. on Foundations of Computer Science, pages 364- 373, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. 16.E. Mann. Private access to distributed in~ormation. Master's thesis, Technion- Israel Institute of Technology, Haifa, 1998.]]Google ScholarGoogle Scholar
  17. 17.R. Ostrovsky and V. Shoup. Private information storage. in Proc. of ~gth $TOC, pages 294-303, 1997.]] Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18.A. Shamir. How to share a secret. Cornrnun. A CM, 22(6):612-613, June 1979.]] Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Improved upper bounds on information-theoretic private information retrieval (extended abstract)

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          STOC '99: Proceedings of the thirty-first annual ACM symposium on Theory of Computing
          May 1999
          790 pages
          ISBN:1581130678
          DOI:10.1145/301250

          Copyright © 1999 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 May 1999

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • Article

          Acceptance Rates

          Overall Acceptance Rate1,469of4,586submissions,32%

          Upcoming Conference

          STOC '24
          56th Annual ACM Symposium on Theory of Computing (STOC 2024)
          June 24 - 28, 2024
          Vancouver , BC , Canada

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader