Journal of the ACM (JACM)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Computer Networks
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Combinatorial Designs: Constructions and Analysis
Combinatorial Designs: Constructions and Analysis
Configurations between geometry and combinatorics
Discrete Applied Mathematics - Optimal discrete structure and algorithms (ODSA 2000)
Peer-to-Peer Private Information Retrieval
PSD '08 Proceedings of the UNESCO Chair in data privacy international conference on Privacy in Statistical Databases
Data Access in a Cyber World: Making Use of Cyberinfrastructure
Transactions on Data Privacy
A survey of single-database private information retrieval: techniques and applications
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
The Functionality-Security-Privacy Game
MDAI '09 Proceedings of the 6th International Conference on Modeling Decisions for Artificial Intelligence
Optimal configurations for peer-to-peer user-private information retrieval
Computers & Mathematics with Applications
Using social networks to distort users' profiles generated by web search engines
Computer Networks: The International Journal of Computer and Telecommunications Networking
Coprivacy: towards a theory of sustainable privacy
PSD'10 Proceedings of the 2010 international conference on Privacy in statistical databases
MDAI'10 Proceedings of the 7th international conference on Modeling decisions for artificial intelligence
On query self-submission in peer-to-peer user-private information retrieval
Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society
Rational behavior in peer-to-peer profile obfuscation for anonymous keyword search
Information Sciences: an International Journal
Information Sciences: an International Journal
Information Sciences: an International Journal
PSD'12 Proceedings of the 2012 international conference on Privacy in Statistical Databases
A query scrambler for search privacy on the internet
Information Retrieval
Hi-index | 0.00 |
Private information retrieval (PIR) is normally modeled as a game between two players: a user and a database. The user wants to retrieve some item from the database without the latter learning which item is retrieved. Most current PIR protocols are ill-suited to provide PIR from a search engine or large database: (i) their computational complexity is linear in the size of the database; (ii) they assume active cooperation by the database server in the PIR protocol. If the database cannot be assumed to cooperate, a peer-to-peer (P2P) user community is a natural alternative to achieve some query anonymity: a user gets her queries submitted on her behalf by other users in the P2P community. In this way, the database still learns which item is being retrieved, but it cannot obtain the real query histories of users, which become diffused among the peer users. We name this relaxation of PIR user-private information retrieval (UPIR). A peer-to-peer UPIR system is described in this paper which relies on an underlying combinatorial structure to reduce the required key material and increase availability. Extensive simulation results are reported and a distributed key management version of the system is described.