skip to main content
10.1145/3564246.3585175acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
research-article

Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE

Published: 02 June 2023 Publication History

Abstract

A (single server) private information retrieval (PIR) allows a client to read data from a public database held on a remote server, without revealing to the server which locations she is reading. In a doubly efficient PIR (DEPIR), the database is first preprocessed, but the server can subsequently answer any client’s query in time that is sub-linear in the database size. Prior work gave a plausible candidate for a public-key variant of DEPIR, where a trusted party is needed to securely preprocess the database and generate a corresponding public key for the clients; security relied on a new non-standard code-based assumption and a heuristic use of ideal obfuscation. In this work we construct the stronger unkeyed notion of DEPIR, where the preprocessing is a deterministic procedure that the server can execute on its own. Moreover, we prove security under just the standard ring learning-with-errors (RingLWE) assumption. For a database of size N and any constant ε>0, the preprocessing run-time and size is O(N1+ε), while the run-time and communication-complexity of each PIR query is polylog(N). We also show how to update the preprocessed database in time O(Nε). Our approach is to first construct a standard PIR where the server’s computation consists of evaluating a multivariate polynomial; we then convert it to a DEPIR by preprocessing the polynomial to allow for fast evaluation, using the techniques of Kedlaya and Umans (STOC ’08).
Building on top of our DEPIR, we construct general fully homomorphic encryption for random-access machines (RAM-FHE), which allows a server to homomorphically evaluate an arbitrary RAM program P over a client’s encrypted input x and the server’s preprocessed plaintext input y to derive an encryption of the output P(x,y) in time that scales with the RAM run-time of the computation rather than its circuit size. Prior work only gave a heuristic candidate construction of a restricted notion of RAM-FHE. In this work, we construct RAM-FHE under the RingLWE assumption with circular security. For a RAM program P with worst-case run-time T, the homomorphic evaluation runs in time T1+ε · (|x| + |y|).

References

[1]
[n. d.]. Post-Quantum Cryptography: Selected Algorithms 2022. https://csrc.nist.gov/projects/post-quantum-cryptography/selected-algorithms-2022 Accessed: 2022-10-28
[2]
Prabhanjan Ananth, Kai-Min Chung, Xiong Fan, and Luowen Qian. 2022. Collusion-Resistant Functional Encryption for RAMs. In Advances in Cryptology – ASIACRYPT 2022, Shweta Agrawal and Dongdai Lin (Eds.). Springer Nature Switzerland, Cham. 160–194. isbn:978-3-031-22963-3 https://doi.org/10.1007/978-3-031-22963-3_6
[3]
Benny Applebaum, David Cash, Chris Peikert, and Amit Sahai. 2009. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems. In Advances in Cryptology – CRYPTO 2009, Shai Halevi (Ed.) (Lecture Notes in Computer Science, Vol. 5677). Springer, Heidelberg, 595–618. https://doi.org/10.1007/978-3-642-03356-8_35
[4]
Gilad Asharov, Ilan Komargodski, Wei-Kai Lin, Kartik Nayak, Enoch Peserico, and Elaine Shi. 2020. OptORAMa: Optimal Oblivious RAM. In Advances in Cryptology – EUROCRYPT 2020, Part II, Anne Canteaut and Yuval Ishai (Eds.) (Lecture Notes in Computer Science, Vol. 12106). Springer, Heidelberg, 403–432. https://doi.org/10.1007/978-3-030-45724-2_14
[5]
Amos Beimel, Yuval Ishai, and Tal Malkin. 2000. Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing. In Advances in Cryptology – CRYPTO 2000, Mihir Bellare (Ed.) (Lecture Notes in Computer Science, Vol. 1880). Springer, Heidelberg, 55–73. https://doi.org/10.1007/3-540-44598-6_4
[6]
Vishwas Bhargava, Sumanta Ghosh, Zeyu Guo, Mrinal Kumar, and Chris Umans. 2022. Fast Multivariate Multipoint Evaluation Over All Finite Fields. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS). 221–232. https://doi.org/10.1109/FOCS54457.2022.00028
[7]
Vishwas Bhargava, Sumanta Ghosh, Mrinal Kumar, and Chandra Kanta Mohapatra. 2022. Fast, Algebraic Multivariate Multipoint Evaluation in Small Characteristic and Applications. In Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing (STOC 2022). Association for Computing Machinery, 403–415. isbn:9781450392648 https://doi.org/10.1145/3519935.3519968
[8]
Nir Bitansky, Sanjam Garg, Huijia Lin, Rafael Pass, and Sidharth Telang. 2015. Succinct Randomized Encodings and their Applications. In 47th Annual ACM Symposium on Theory of Computing, Rocco A. Servedio and Ronitt Rubinfeld (Eds.). ACM Press, 439–448. https://doi.org/10.1145/2746539.2746574
[9]
Elette Boyle, Justin Holmgren, Fermi Ma, and Mor Weiss. 2021. On the Security of Doubly Efficient PIR. Cryptology ePrint Archive, Report 2021/1113. https://eprint.iacr.org/2021/1113
[10]
Elette Boyle, Justin Holmgren, and Mor Weiss. 2019. Permuted Puzzles and Cryptographic Hardness. In TCC 2019: 17th Theory of Cryptography Conference, Part II, Dennis Hofheinz and Alon Rosen (Eds.) (Lecture Notes in Computer Science, Vol. 11892). Springer, Heidelberg, 465–493. https://doi.org/10.1007/978-3-030-36033-7_18
[11]
Elette Boyle, Yuval Ishai, Rafael Pass, and Mary Wootters. 2017. Can We Access a Database Both Locally and Privately? In TCC 2017: 15th Theory of Cryptography Conference, Part II, Yael Kalai and Leonid Reyzin (Eds.) (Lecture Notes in Computer Science, Vol. 10678). Springer, Heidelberg, 662–693. https://doi.org/10.1007/978-3-319-70503-3_22
[12]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (Leveled) fully homomorphic encryption without bootstrapping. In ITCS 2012: 3rd Innovations in Theoretical Computer Science, Shafi Goldwasser (Ed.). Association for Computing Machinery, 309–325. https://doi.org/10.1145/2090236.2090262
[13]
Zvika Brakerski, Adeline Langlois, Chris Peikert, Oded Regev, and Damien Stehlé. 2013. Classical hardness of learning with errors. In 45th Annual ACM Symposium on Theory of Computing, Dan Boneh, Tim Roughgarden, and Joan Feigenbaum (Eds.). ACM Press, 575–584. https://doi.org/10.1145/2488608.2488680
[14]
Zvika Brakerski and Vinod Vaikuntanathan. 2011. Efficient Fully Homomorphic Encryption from (Standard) LWE. In 52nd Annual Symposium on Foundations of Computer Science, Rafail Ostrovsky (Ed.). IEEE Computer Society Press, 97–106. https://doi.org/10.1109/FOCS.2011.12
[15]
Zvika Brakerski and Vinod Vaikuntanathan. 2011. Fully Homomorphic Encryption from Ring-LWE and Security for Key Dependent Messages. In Advances in Cryptology – CRYPTO 2011, Phillip Rogaway (Ed.) (Lecture Notes in Computer Science, Vol. 6841). Springer, Heidelberg, 505–524. https://doi.org/10.1007/978-3-642-22792-9_29
[16]
Ran Canetti, Yilei Chen, Justin Holmgren, and Mariana Raykova. 2016. Adaptive Succinct Garbled RAM or: How to Delegate Your Database. In TCC 2016-B: 14th Theory of Cryptography Conference, Part II, Martin Hirt and Adam D. Smith (Eds.) (Lecture Notes in Computer Science, Vol. 9986). Springer, Heidelberg, 61–90. https://doi.org/10.1007/978-3-662-53644-5_3
[17]
Ran Canetti and Justin Holmgren. 2016. Fully Succinct Garbled RAM. In ITCS 2016: 7th Conference on Innovations in Theoretical Computer Science, Madhu Sudan (Ed.). Association for Computing Machinery, 169–178. https://doi.org/10.1145/2840728.2840765
[18]
Ran Canetti, Justin Holmgren, Abhishek Jain, and Vinod Vaikuntanathan. 2015. Succinct Garbling and Indistinguishability Obfuscation for RAM Programs. In 47th Annual ACM Symposium on Theory of Computing, Rocco A. Servedio and Ronitt Rubinfeld (Eds.). ACM Press, 429–437. https://doi.org/10.1145/2746539.2746621
[19]
Ran Canetti, Justin Holmgren, and Silas Richelson. 2017. Towards Doubly Efficient Private Information Retrieval. In TCC 2017: 15th Theory of Cryptography Conference, Part II, Yael Kalai and Leonid Reyzin (Eds.) (Lecture Notes in Computer Science, Vol. 10678). Springer, Heidelberg, 694–726. https://doi.org/10.1007/978-3-319-70503-3_23
[20]
Benny Chor, Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan. 1995. Private Information Retrieval. In 36th Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, 41–50. https://doi.org/10.1109/SFCS.1995.492461
[21]
Stephen A. Cook and Robert A. Reckhow. 1972. Time-Bounded Random Access Machines. In Proceedings of the 4th Annual ACM Symposium on Theory of Computing, May 1-3, 1972, Denver, Colorado, USA, Patrick C. Fischer, H. Paul Zeiger, Jeffrey D. Ullman, and Arnold L. Rosenberg (Eds.). ACM, 73–80. https://doi.org/10.1145/800152.804898
[22]
Henry Corrigan-Gibbs, Alexandra Henzinger, and Dmitry Kogan. 2022. Single-Server Private Information Retrieval with Sublinear Amortized Time. In Advances in Cryptology – EUROCRYPT 2022, Part II, Orr Dunkelman and Stefan Dziembowski (Eds.) (Lecture Notes in Computer Science, Vol. 13276). Springer, Heidelberg, 3–33. https://doi.org/10.1007/978-3-031-07085-3_1
[23]
Henry Corrigan-Gibbs and Dmitry Kogan. 2020. Private Information Retrieval with Sublinear Online Time. In Advances in Cryptology – EUROCRYPT 2020, Part I, Anne Canteaut and Yuval Ishai (Eds.) (Lecture Notes in Computer Science, Vol. 12105). Springer, Heidelberg, 44–75. https://doi.org/10.1007/978-3-030-45721-1_3
[24]
Sanjam Garg, Steve Lu, and Rafail Ostrovsky. 2015. Black-Box Garbled RAM. In 56th Annual Symposium on Foundations of Computer Science, Venkatesan Guruswami (Ed.). IEEE Computer Society Press, 210–229. https://doi.org/10.1109/FOCS.2015.22
[25]
Craig Gentry. 2009. Fully homomorphic encryption using ideal lattices. In 41st Annual ACM Symposium on Theory of Computing, Michael Mitzenmacher (Ed.). ACM Press, 169–178. https://doi.org/10.1145/1536414.1536440
[26]
Craig Gentry, Shai Halevi, Steve Lu, Rafail Ostrovsky, Mariana Raykova, and Daniel Wichs. 2014. Garbled RAM Revisited. In Advances in Cryptology – EUROCRYPT 2014, Phong Q. Nguyen and Elisabeth Oswald (Eds.) (Lecture Notes in Computer Science, Vol. 8441). Springer, Heidelberg, 405–422. https://doi.org/10.1007/978-3-642-55220-5_23
[27]
Craig Gentry, Shai Halevi, Mariana Raykova, and Daniel Wichs. 2014. Outsourcing Private RAM Computation. In 55th Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, 404–413. https://doi.org/10.1109/FOCS.2014.50
[28]
Craig Gentry, Amit Sahai, and Brent Waters. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In Advances in Cryptology – CRYPTO 2013, Part I, Ran Canetti and Juan A. Garay (Eds.) (Lecture Notes in Computer Science, Vol. 8042). Springer, Heidelberg, 75–92. https://doi.org/10.1007/978-3-642-40041-4_5
[29]
Oded Goldreich and Rafail Ostrovsky. 1996. Software Protection and Simulation on Oblivious RAMs. J. ACM, 43, 3 (1996), may, 431–473. issn:0004-5411 https://doi.org/10.1145/233551.233553
[30]
Ariel Hamlin, Justin Holmgren, Mor Weiss, and Daniel Wichs. 2019. On the Plausibility of Fully Homomorphic Encryption for RAMs. In Advances in Cryptology – CRYPTO 2019, Part I, Alexandra Boldyreva and Daniele Micciancio (Eds.) (Lecture Notes in Computer Science, Vol. 11692). Springer, Heidelberg, 589–619. https://doi.org/10.1007/978-3-030-26948-7_21
[31]
Ariel Hamlin, Rafail Ostrovsky, Mor Weiss, and Daniel Wichs. 2019. Private Anonymous Data Access. In Advances in Cryptology – EUROCRYPT 2019, Part II, Yuval Ishai and Vincent Rijmen (Eds.) (Lecture Notes in Computer Science, Vol. 11477). Springer, Heidelberg, 244–273. https://doi.org/10.1007/978-3-030-17656-3_9
[32]
Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. 1998. NTRU: A Ring-Based Public Key Cryptosystem. In Algorithmic Number Theory, Third International Symposium, ANTS-III, Portland, Oregon, USA, June 21-25, 1998, Proceedings, Joe Buhler (Ed.) (Lecture Notes in Computer Science, Vol. 1423). Springer, 267–288. https://doi.org/10.1007/BFb0054868
[33]
Aayush Jain, Huijia Lin, and Ji Luo. 2022. On the Optimal Succinctness and Efficiency of Functional Encryption and Attribute-Based Encryption. Cryptology ePrint Archive, Paper 2022/1317. https://eprint.iacr.org/2022/1317
[34]
Kiran S. Kedlaya and Christopher Umans. 2008. Fast Modular Composition in any Characteristic. In 49th Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, 146–155. https://doi.org/10.1109/FOCS.2008.13
[35]
Kiran S. Kedlaya and Christopher Umans. 2011. Fast Polynomial Factorization and Modular Composition. SIAM J. Comput., 40, 6 (2011), 1767–1802. https://doi.org/10.1137/08073408X
[36]
Ilan Komargodski and Wei-Kai Lin. 2021. A Logarithmic Lower Bound for Oblivious RAM (for All Parameters). In Advances in Cryptology – CRYPTO 2021, Part IV, Tal Malkin and Chris Peikert (Eds.) (Lecture Notes in Computer Science, Vol. 12828). Springer, Heidelberg, Virtual Event. 579–609. https://doi.org/10.1007/978-3-030-84259-8_20
[37]
Eyal Kushilevitz and Rafail Ostrovsky. 2000. One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval. In Advances in Cryptology – EUROCRYPT 2000, Bart Preneel (Ed.) (Lecture Notes in Computer Science, Vol. 1807). Springer, Heidelberg, 104–121. https://doi.org/10.1007/3-540-45539-6_9
[38]
Adeline Langlois and Damien Stehlé. 2015. Worst-Case to Average-Case Reductions for Module Lattices. Des. Codes Cryptography, 75, 3 (2015), jun, 565–599. issn:0925-1022 https://doi.org/10.1007/s10623-014-9938-4
[39]
Kasper Green Larsen and Jesper Buus Nielsen. 2018. Yes, There is an Oblivious RAM Lower Bound!. In Advances in Cryptology – CRYPTO 2018, Part II, Hovav Shacham and Alexandra Boldyreva (Eds.) (Lecture Notes in Computer Science, Vol. 10992). Springer, Heidelberg, 523–542. https://doi.org/10.1007/978-3-319-96881-0_18
[40]
Wei-Kai Lin, Ethan Mook, and Daniel Wichs. 2022. Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE. Cryptology ePrint Archive, Paper 2022/1703. https://eprint.iacr.org/2022/1703
[41]
Adriana López-Alt, Eran Tromer, and Vinod Vaikuntanathan. 2012. On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In 44th Annual ACM Symposium on Theory of Computing, Howard J. Karloff and Toniann Pitassi (Eds.). ACM Press, 1219–1234. https://doi.org/10.1145/2213977.2214086
[42]
Steve Lu and Rafail Ostrovsky. 2013. How to Garble RAM Programs. In Advances in Cryptology – EUROCRYPT 2013, Thomas Johansson and Phong Q. Nguyen (Eds.) (Lecture Notes in Computer Science, Vol. 7881). Springer, Heidelberg, 719–734. https://doi.org/10.1007/978-3-642-38348-9_42
[43]
Vadim Lyubashevsky and Daniele Micciancio. 2006. Generalized Compact Knapsacks Are Collision Resistant. In ICALP 2006: 33rd International Colloquium on Automata, Languages and Programming, Part II, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.) (Lecture Notes in Computer Science, Vol. 4052). Springer, Heidelberg, 144–155. https://doi.org/10.1007/11787006_13
[44]
Vadim Lyubashevsky, Chris Peikert, and Oded Regev. 2010. On Ideal Lattices and Learning with Errors over Rings. In Advances in Cryptology – EUROCRYPT 2010, Henri Gilbert (Ed.) (Lecture Notes in Computer Science, Vol. 6110). Springer, Heidelberg, 1–23. https://doi.org/10.1007/978-3-642-13190-5_1
[45]
Daniele Micciancio. 2002. Generalized Compact Knapsacks, Cyclic Lattices, and Efficient One-Way Functions from Worst-Case Complexity Assumptions. In 43rd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, 356–365. https://doi.org/10.1109/SFCS.2002.1181960
[46]
Rafail Ostrovsky and Victor Shoup. 1997. Private Information Storage (Extended Abstract). In 29th Annual ACM Symposium on Theory of Computing. ACM Press, 294–303. https://doi.org/10.1145/258533.258606
[47]
Sarvar Patel, Giuseppe Persiano, Mariana Raykova, and Kevin Yeo. 2018. PanORAMa: Oblivious RAM with Logarithmic Overhead. In 59th Annual Symposium on Foundations of Computer Science, Mikkel Thorup (Ed.). IEEE Computer Society Press, 871–882. https://doi.org/10.1109/FOCS.2018.00087
[48]
Chris Peikert, Oded Regev, and Noah Stephens-Davidowitz. 2017. Pseudorandomness of ring-LWE for any ring and modulus. In 49th Annual ACM Symposium on Theory of Computing, Hamed Hatami, Pierre McKenzie, and Valerie King (Eds.). ACM Press, 461–473. https://doi.org/10.1145/3055399.3055489
[49]
Chris Peikert and Alon Rosen. 2006. Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices. In TCC 2006: 3rd Theory of Cryptography Conference, Shai Halevi and Tal Rabin (Eds.) (Lecture Notes in Computer Science, Vol. 3876). Springer, Heidelberg, 145–166. https://doi.org/10.1007/11681878_8
[50]
Giuseppe Persiano and Kevin Yeo. 2022. Limits of Preprocessing for Single-Server PIR. In Proceedings of the 2022 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA). 2522–2548. https://doi.org/10.1137/1.9781611977073.99
[51]
Nicholas Pippenger and Michael J. Fischer. 1979. Relations Among Complexity Measures. J. ACM, 26, 2 (1979), 361–381. https://doi.org/10.1145/322123.322138
[52]
Ronald L Rivest, Len Adleman, and Michael L Dertouzos. 1978. On data banks and privacy homomorphisms. Foundations of secure computation, Academia Press.
[53]
Marten van Dijk, Craig Gentry, Shai Halevi, and Vinod Vaikuntanathan. 2010. Fully Homomorphic Encryption over the Integers. In Advances in Cryptology – EUROCRYPT 2010, Henri Gilbert (Ed.) (Lecture Notes in Computer Science, Vol. 6110). Springer, Heidelberg, 24–43. https://doi.org/10.1007/978-3-642-13190-5_2
[54]
Mingxun Zhou, Wei-Kai Lin, Yiannis Tselekounis, and Elaine Shi. 2022. Optimal Single-Server Private Information Retrieval. Cryptology ePrint Archive, Report 2022/609. https://eprint.iacr.org/2022/609

Cited By

View all

Index Terms

  1. Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of Computing
    June 2023
    1926 pages
    ISBN:9781450399135
    DOI:10.1145/3564246
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 02 June 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. FHE for RAM
    2. doubly efficient PIR

    Qualifiers

    • Research-article

    Funding Sources

    • NSF
    • Alfred P. Sloan Research Fellowship

    Conference

    STOC '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Upcoming Conference

    STOC '25
    57th Annual ACM Symposium on Theory of Computing (STOC 2025)
    June 23 - 27, 2025
    Prague , Czech Republic

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)192
    • Downloads (Last 6 weeks)22
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Towards Practical Doubly-Efficient Private Information RetrievalFinancial Cryptography and Data Security10.1007/978-3-031-78679-2_14(264-282)Online publication date: 16-Feb-2025
    • (2024)Amortizing Circuit-PSI in the Multiple Sender/Receiver SettingIACR Communications in Cryptology10.62056/a0fhsgvtwOnline publication date: 7-Oct-2024
    • (2024)YPIRProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699235(5985-6002)Online publication date: 14-Aug-2024
    • (2024)Keyword-Based PIR Method for Enhancing Large-Scale Power Credit2024 43rd Chinese Control Conference (CCC)10.23919/CCC63176.2024.10662762(3673-3678)Online publication date: 28-Jul-2024
    • (2024)Simple and Practical Amortized Sublinear Private Information Retrieval using Dummy SubsetsProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690266(1420-1433)Online publication date: 2-Dec-2024
    • (2024)Distributed PIR: Scaling Private Messaging via the Users' MachinesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670350(1967-1981)Online publication date: 2-Dec-2024
    • (2024)Piano: Extremely Simple, Single-Server PIR with Sublinear Server Computation2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00055(4296-4314)Online publication date: 19-May-2024
    • (2024)How to Simulate Random Oracles with Auxiliary Input2024 IEEE 65th Annual Symposium on Foundations of Computer Science (FOCS)10.1109/FOCS61266.2024.00080(1207-1230)Online publication date: 27-Oct-2024
    • (2024)Single-Server PIR via NTRU-Based FHE: Simpler, Smaller, and Faster2024 IEEE 9th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP60621.2024.00023(293-310)Online publication date: 8-Jul-2024
    • (2024)Hintless Single-Server Private Information RetrievalAdvances in Cryptology – CRYPTO 202410.1007/978-3-031-68400-5_6(183-217)Online publication date: 16-Aug-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media