Recommended Reading
Beimel A, Ishai Y. Information-theoretic private information retrieval: a unified construction. In: Proceedings of 28th international colloquium on automata, languages and programming; 2001. p. 912–26.
Cachin C, Micali S, Stadler M. Computationally private information retrieval with polylogarithmic communication. In: Proceedings of EUROCRYPT’99; 1999. p. 402–14.
Chang Y. Single database private information retrieval with logarithmic communication. In: Proceedings of 9th Australasian conference on information security and privacy; 2004. p. 50–61.
Chor B, Goldreich O, Kushilevitz E, Sudan M. Private information retrieval. In: Proceedings of 36th IEEE symposium on foundations of computer science; 1995. p. 41–51.
Chor B, Kushilevitz E, Goldreich O, Sudan M. Private information retrieval. J ACM. 1998;45(6) L965–81.
Damgard I, Jurik M. A generalisation. A simplification and some applications of Paillier’s probabilistic public-key system. In: Proceedings of PKC’01; 2001. p. 119–36.
Devet C, Goldberg I, Heninger N. Optimally robust private information retrieval. In: Proceedings of USENIX’12; 2012. p. 13–13.
Gasarch, W. A survey on private information retrieval. The Bulletin of the EATCS, 2004; 82:72–107.
Gentry C. Fully homomorphic encryption using ideal lattices. In: Proceedings of STOC’09, 2009; p. 169–78.
Gentry C. Toward basing fully homomorphic encryption on worst-case hardness. In: Proceedings of CRYPTO’10; 2010. p. 116–37.
Gentry C, Ramzan Z. Single database private information retrieval with constant communication rate. In: Proceedings of ICALP’05; 2005. p. 803–15.
Goldreich, O. and Levin, LA. A hard-core predicate for all one-way functions. In: Proceedings of the twenty-first annual ACM symposium on theory of computing; 1989. p. 25–32.
Goldwasser S, Micali S. Probabilistic encryption. J Comput Syst Sci. 1984;28(2):270–99.
Kushilevitz E, Ostrovsky R. Replication is not needed: single database, computationally-private information retrieval. In: Proceedings of 38th annual IEEE symposium on the foundations of computer science; 1997. p. 364–73.
Kushilevitz E, Ostrovsky R. One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. In: Proceedings of EUROCRYPT’00; 2000. p. 104–21.
Lipmaa H. An oblivious transfer protocol with log-squared communication. In: Proceedings of 8th information security conference; 2005. p. 314–28.
Lipmaa H. First CPIR protocol with data-dependent computation. In: Proceedings of ICISC’09; 2009 p. 193–210.
Lliev A, Smith SW. Protecting client privacy with trusted computing at the server. IEEE Secur Priv. 2005;3(2):20–28.
Naor M, Pinkas B. Oblivious transfer with adaptive queries. In: Proceedings of CRYPTO’99; 1999. p. 791–91.
Naor M, Yung M. Universal one-way hash functions and their cryptographic applications. In: Proceedings of STOC’89; 1989. p. 33–43.
Ostrovsky R, Skeith WE III. Private searching on streaming data. In: Proceedings of Crypto’05; 2005. p. 223–40.
Ostovsky R, Skeith WE III. A survey of single-database PIR: Techniques and applications. In: Proceedings of PKC’07; 2007. p. 393–411.
Ostrovsky R, Skeith WE III. Private searching on streaming data. J Cryptol. 2007;20(4):397–430.
Paillier P. Public key cryptosystems based on composite degree residue classes. In: Proceedings of EUROCRYPT’99; 1999. p. 223–38.
Paulet R, Kaosar MG, Yi X, Bertino E. Privacy-preserving and content-protecting location based queries. In: Proceedings of ICDE’12; 2012. p. 44–53.
Paulet, R., Kaosar, MG., Yi, X. and Bertino, E. Privacy-preserving and content-protecting location based queries. IEEE transactions on knowledge and data engineering, 2014; 26(5):1200–10.
Pohlig S, Hellman M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Trans Inf Theory. 1978;24(1):106–10.
Sion R, Carbunar B. On the computational practicality of private information retrieval. In: Proceedings of NDSS’07; 2007.
Wang S, Ding X, Deng RH, Bao F. Private information retrieval using trusted hardware. In: Proceedings of ESORICS’06; 2006. p. 49–64.
Yi X, Kaosar M, Paulet R, Bertino E. Single-database private information retrieval from fully homomorphic encryption. IEEE Trans Knowl Data Eng. 2013;25(5):1125–34.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2017 Springer Science+Business Media LLC
About this entry
Cite this entry
Yi, X. (2017). Private Information Retrieval. In: Liu, L., Özsu, M. (eds) Encyclopedia of Database Systems. Springer, New York, NY. https://doi.org/10.1007/978-1-4899-7993-3_80752-1
Download citation
DOI: https://doi.org/10.1007/978-1-4899-7993-3_80752-1
Received:
Accepted:
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4899-7993-3
Online ISBN: 978-1-4899-7993-3
eBook Packages: Springer Reference Computer SciencesReference Module Computer Science and Engineering