Towards practical private information retrieval from homomorphic encryption
Private information retrieval (PIR) allows a client to retrieve data from a remote database while hiding the client's access pattern.To be applicable for practical usage, PIR protocol should have low communication and computational costs.In this paper a new generic PIR protocol based on somewha...
Saved in:
| Date: | 2015 |
|---|---|
| Main Author: | Zhuravlev, Dmitry |
| Format: | Article |
| Language: | English |
| Published: |
Lugansk National Taras Shevchenko University
2015
|
| Subjects: | |
| Online Access: | https://admjournal.luguniv.edu.ua/index.php/adm/article/view/74 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Algebra and Discrete Mathematics |
Institution
Algebra and Discrete MathematicsSimilar Items
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021)
by: Волошко, А. В., et al.
Published: (2021)
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018)
by: Ustimenko, A. A.
Published: (2018)
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018)
by: Sokolovskyi, V. S., et al.
Published: (2018)
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025)
by: Боярінова, Ю. Є., et al.
Published: (2025)
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)
by: Volynets, O. Yu., et al.
Published: (2019)
Intercalibration of methods for the land surface thermodynamic temperature retrieving inside urban area by thermal-infrared satellite imaging
by: Stankevich, Sergey, et al.
Published: (2015)
by: Stankevich, Sergey, et al.
Published: (2015)
Torsion-free groups with every proper homomorphic image an \(\bf N_1\)-group
by: Ercan, Selami
Published: (2018)
by: Ercan, Selami
Published: (2018)
Modern information technologies in organization of geophysical studies
by: Savkiv, L. G., et al.
Published: (2018)
by: Savkiv, L. G., et al.
Published: (2018)
Distributed Transactions Modeling with the Use of Petri Nets
by: Iwaniak, M., et al.
Published: (2012)
by: Iwaniak, M., et al.
Published: (2012)
Central and non central codes of dihedral 2-groups
by: Gupta, S., et al.
Published: (2022)
by: Gupta, S., et al.
Published: (2022)
Coloured Petri Net Model of Two-Phase Commit Protocol With Multiple Participants
by: Iwaniak, M., et al.
Published: (2013)
by: Iwaniak, M., et al.
Published: (2013)
On differential preradicals
by: Horbachuk, Omelyan, et al.
Published: (2018)
by: Horbachuk, Omelyan, et al.
Published: (2018)
Construction of self-dual binary \([2^{2k},2^{2k-1},2^k]\)-codes
by: Hannusch, Carolin, et al.
Published: (2016)
by: Hannusch, Carolin, et al.
Published: (2016)
CREATING THE RT-32 RADIO TELESCOPE ON THE BASIC OF MARK-4B ANTENNA SYSTEM. 1. MODERNIZATION PROJECT AND FIRST RESULTS
by: Ulyanov, O. M., et al.
Published: (2019)
by: Ulyanov, O. M., et al.
Published: (2019)
ЯКІСНИЙ АНАЛІЗМАТЕМАТИЧНИХ МОДЕЛЕЙ ПРОЦЕСІВ І ПРИСТРОЇВ ПЕРВИННОЇ ОБРОБКИ ВУГЛЕВОДНЕВОЇ СИРОВИНИ НА ОСНОВІ УЗАГАЛЬНЕНИХ МОДЕЛЕЙ
by: Polozhaenko, Sergey Anatolievich
Published: (2013)
by: Polozhaenko, Sergey Anatolievich
Published: (2013)
Endomorphisms of Clifford semigroups with injective structure homomorphisms
by: Worawiset, S., et al.
Published: (2021)
by: Worawiset, S., et al.
Published: (2021)
Lattice rings: an interpretation of \(L\)-fuzzy rings as habitual algebraic structures
by: Kurdachenko, Leonid A., et al.
Published: (2018)
by: Kurdachenko, Leonid A., et al.
Published: (2018)
Optimization models of reconfiguring network structures
by: Kuzmychov, A. I., et al.
Published: (2017)
by: Kuzmychov, A. I., et al.
Published: (2017)
Solutions to the symmetric traveling salesman problem for 1354 locations in the Kyiv region: Concorde solver
by: Anisa, Kasim, et al.
Published: (2025)
by: Anisa, Kasim, et al.
Published: (2025)
Information and analytical system for researching the impact of cryptocurrency mining towards CO₂ emissions
by: Terentiev, Oleksandr M., et al.
Published: (2024)
by: Terentiev, Oleksandr M., et al.
Published: (2024)
Technological Aspects and Environmental Consequences of Mining Encryption
by: Makurin, Andrii
Published: (2023)
by: Makurin, Andrii
Published: (2023)
INVOLVEMENT OF ALTIMETRY INFORMATION INTO THE IMPROVED PHOTOCLINOMETRY METHOD FOR RELIEF RETRIEVAL FROM A SLOPE FIELD
by: Kornienko, Yu. V., et al.
Published: (2021)
by: Kornienko, Yu. V., et al.
Published: (2021)
Transformations of \((0,1]\) preserving tails of \(\Delta^{\mu}\)-representation of numbers
by: Isaieva, Tetiana M., et al.
Published: (2016)
by: Isaieva, Tetiana M., et al.
Published: (2016)
Analysis of the Advancement of Public-Private Partnership in Ukraine
by: Negrych, Mykola, et al.
Published: (2024)
by: Negrych, Mykola, et al.
Published: (2024)
Скринінг противірусної активності в ряду С5 та N3 заміщених похідних 4-тіазолідинонів
by: Kaminskyy, D. V.
Published: (2015)
by: Kaminskyy, D. V.
Published: (2015)
Data combination method in Remote Sensing tasks in case of conflicting information sources
by: Alpert, Sofiia
Published: (2021)
by: Alpert, Sofiia
Published: (2021)
A two-symbol system of encoding and some of its applications
by: Pratsiovytyi, Mykola, et al.
Published: (2025)
by: Pratsiovytyi, Mykola, et al.
Published: (2025)
Periods of Tribonacci sequences and elliptic curves
by: AIt-Amrane, Lyes, et al.
Published: (2018)
by: AIt-Amrane, Lyes, et al.
Published: (2018)
Towards the theory of branching spaces
by: Fomin, P. I., et al.
Published: (2013)
by: Fomin, P. I., et al.
Published: (2013)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Investment and Infrastructure Development Projects in Public–Private Partnerships in Ukraine
by: Lozynska, Tamara, et al.
Published: (2024)
by: Lozynska, Tamara, et al.
Published: (2024)
TOWARD A NEW PARADIGM OF KARST
by: Andreychuk, V.N.
Published: (2017)
by: Andreychuk, V.N.
Published: (2017)
On the number of topologies on a finite set
by: Kizmaz, M. Yasir
Published: (2019)
by: Kizmaz, M. Yasir
Published: (2019)
Синтез 4,4,6-триметил-8-R-4Н-піроло[3,2,1-ij]хінолін-1,2-діонів
by: Lescheva, E. V., et al.
Published: (2014)
by: Lescheva, E. V., et al.
Published: (2014)
AN ANTHOLOGY OF THE DISTINGUISHED ACHIEVEMENTS IN SCIENCE AND TECHNIQUE. PART 34: DISCOVERY AND STUDY OF QUANTUM-WAVE NATURE OF MICROSCOPIC WORLD OF MATTER
by: Baranov, M. I.
Published: (2016)
by: Baranov, M. I.
Published: (2016)
Комплексоутворення 4-амінобензгідроксамової кислоти з іонами Ru(III), Rh(III) та Pd(II)
by: Zborovskii, Yu. L., et al.
Published: (2014)
by: Zborovskii, Yu. L., et al.
Published: (2014)
Divisor function of the Gaussian integers weighted by the Kloosterman sum
by: Varbanets, Pavel, et al.
Published: (2026)
by: Varbanets, Pavel, et al.
Published: (2026)
Characterization of Chebyshev Numbers
by: Jacobs, David Pokrass, et al.
Published: (2018)
by: Jacobs, David Pokrass, et al.
Published: (2018)
Norm of Gaussian integers in arithmetical progressions and narrow sectors
by: Varbanets, S., et al.
Published: (2020)
by: Varbanets, S., et al.
Published: (2020)
Conic bundles over real formal power series field
by: Bazyleu, Dzmitry F., et al.
Published: (2018)
by: Bazyleu, Dzmitry F., et al.
Published: (2018)
Similar Items
-
A combined data encryption method with identification of their sender
by: Волошко, А. В., et al.
Published: (2021) -
Maximality of affine group, and hidden graph cryptosystems
by: Ustimenko, A. A.
Published: (2018) -
Securing virtual machines with AMD Zen CPU architecture and instruction set
by: Sokolovskyi, V. S., et al.
Published: (2018) -
A method for securely storing a blockchain network account private key
by: Боярінова, Ю. Є., et al.
Published: (2025) -
Improvement of role-based access control model in private cloud environments
by: Volynets, O. Yu., et al.
Published: (2019)