Computationally private information retrieval (extended abstract)
STOC '97 Proceedings of the twenty-ninth annual ACM symposium on Theory of computing
A New Efficient All-Or-Nothing Disclosure of Secrets Protocol
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
FOCS '95 Proceedings of the 36th Annual Symposium on Foundations of Computer Science
Replication is not needed: single database, computationally-private information retrieval
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Value complete, column complete, predicate complete
The VLDB Journal — The International Journal on Very Large Data Bases
Computationally private information retrieval with polylogarithmic communication
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
GPU Computing Gems Emerald Edition
GPU Computing Gems Emerald Edition
Single-database private information retrieval with constant communication rate
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
High throughput filtering using FPGA-acceleration
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Hi-index | 0.00 |
Database outsourcing as a service is a new trend emerging in the computing industry instead of managing database in-house. This introduces several security issues related to database. One of the important security requirements is privacy. A Private Information Retrieval protocol (PIR) allows user to retrieve an element from the database in such way that identity of that element is not get revealed by database server. In this project work, we present the optimized lattice based PIR schema. This proposed schema is based on use of different techniques like General Purpose Graphics Processing Unit (GPGPU) and cache like technology to reduce accessibility. The latest proposed PIR scheme deal with user privacy, use of GPGPU but left to focus on data privacy, data confidentiality and accessibility cost. In our approach our system focusing on issues like user privacy, data confidentiality and accessibility cost by using cache and computational overhead by using GPGPU. Thus searching time of proposed PIR protocol is minimized to number of records in the cache. Thus our proposed design improves the overall performance of PIR protocol.