Practical Private Information Retrieval

[1]  Stephen S. Yau,et al.  Controlled privacy preserving keyword search , 2008, ASIACCS '08.

[2]  Katherine A. Heller,et al.  Bayesian hierarchical clustering , 2005, ICML.

[3]  Helger Lipmaa,et al.  An Oblivious Transfer Protocol with Log-Squared Communication , 2005, ISC.

[4]  George Danezis,et al.  Denial of service or denial of security? , 2007, CCS '07.

[5]  Peishun Wang,et al.  Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing , 2010, AISC.

[6]  Silvio Micali,et al.  Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.

[7]  Hakan Hacigümüs,et al.  Executing SQL over encrypted data in the database-service-provider model , 2002, SIGMOD '02.

[8]  Sergey Yekhanin,et al.  Private information retrieval , 2010, CACM.

[9]  D. Boneh,et al.  Short Signatures from the Weil Pairing , 2001, Journal of Cryptology.

[10]  Panos Kalnis,et al.  Private queries in location based services: anonymizers are not necessary , 2008, SIGMOD Conference.

[11]  R. Lippmann,et al.  An introduction to computing with neural nets , 1987, IEEE ASSP Magazine.

[12]  Joonsang Baek,et al.  On the Integration of Public Key Data Encryption and Public Key Encryption with Keyword Search , 2006, ISC.

[13]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[14]  Stefan Richter,et al.  NISAN: network information service for anonymization networks , 2009, CCS.

[15]  Martin Dietzfelbinger,et al.  Hash, Displace, and Compress , 2009, ESA.

[16]  Ian Goldberg,et al.  Revisiting the Computational Practicality of Private Information Retrieval , 2011, Financial Cryptography.

[17]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[18]  Amos Beimel,et al.  Robust Information-Theoretic Private Information Retrieval , 2002, Journal of Cryptology.

[19]  Niv Gilboa,et al.  Computationally private information retrieval (extended abstract) , 1997, STOC '97.

[20]  Philippe Gaborit,et al.  A Lattice-Based Computationally-Efficient Private Information Retrieval Protocol , 2007, IACR Cryptol. ePrint Arch..

[21]  David A. Landgrebe,et al.  A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..

[22]  Rafail Ostrovsky,et al.  Batch codes and their applications , 2004, STOC '04.

[23]  Eyal Kushilevitz,et al.  Private information retrieval , 1998, JACM.

[24]  Carmela Troncoso,et al.  Scalable Anonymous Communication with Provable Security , 2010, HotSec.

[25]  Sergey Yekhanin,et al.  Locally Decodable Codes: A Brief Survey , 2011, IWCC.

[26]  Nivio Ziviani,et al.  External perfect hashing for very large key sets , 2007, CIKM '07.

[27]  Radu Sion,et al.  On the Practicality of Private Information Retrieval , 2007, NDSS.

[28]  Rafail Ostrovsky,et al.  Private Searching on Streaming Data , 2005, Journal of Cryptology.

[29]  Nikita Borisov,et al.  Breaking the Collusion Detection Mechanism of MorphMix , 2006, Privacy Enhancing Technologies.

[30]  Sean W. Smith,et al.  Protecting client privacy with trusted computing at the server , 2005, IEEE Security & Privacy Magazine.

[31]  Jeffrey Scott Vitter,et al.  Implementing I/O-efficient Data Structures Using TPIE , 2002, ESA.

[32]  Ian Goldberg,et al.  Privacy-Preserving Queries over Relational Databases , 2010, Privacy Enhancing Technologies.

[33]  Steve Kopp,et al.  Understanding Map Projections , 2001 .

[34]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[35]  Yuval Ishai,et al.  Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing , 2004, Journal of Cryptology.

[36]  Nitesh Saxena,et al.  On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot , 2010, Privacy Enhancing Technologies.

[37]  Elaine Shi,et al.  Multi-Dimensional Range Query over Encrypted Data , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[38]  Benny Pinkas,et al.  Keyword Search and Oblivious Pseudorandom Functions , 2005, TCC.

[39]  Philippe Gaborit,et al.  High-Speed Private Information Retrieval Computation on GPU , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[40]  Yuval Ishai,et al.  Protecting data privacy in private information retrieval schemes , 1998, STOC '98.

[41]  Yves Deswarte,et al.  Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases , 2006, Privacy in Statistical Databases.

[42]  Jan Camenisch,et al.  Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..

[43]  Ari Juels,et al.  Targeted Advertising ... And Privacy Too , 2001, CT-RSA.

[44]  Siu-Ming Yiu,et al.  Oblivious Transfer with Access Control : Realizing Disjunction without Duplication , 2010, Pairing.

[45]  Craig Gentry,et al.  Single-Database Private Information Retrieval with Constant Communication Rate , 2005, ICALP.

[46]  Chi-Yin Chow,et al.  A peer-to-peer spatial cloaking algorithm for anonymous location-based service , 2006, GIS '06.

[47]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[48]  Prateek Mittal,et al.  In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems , 2010, CCS '10.

[49]  Rafail Ostrovsky,et al.  Public Key Encryption That Allows PIR Queries , 2007, CRYPTO.

[50]  Carmela Troncoso,et al.  PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval , 2011, USENIX Security Symposium.

[51]  Rafail Ostrovsky,et al.  A Survey of Single-Database Private Information Retrieval: Techniques and Applications , 2007, Public Key Cryptography.

[52]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[53]  Jitender S. Deogun,et al.  The smart phones of tomorrow , 2008, SIGBED.

[54]  Jan Camenisch,et al.  Endorsed E-Cash , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[55]  Sean W. Smith,et al.  Private Information Storage with Logarithm-Space Secure Hardware , 2004, International Information Security Workshops.

[56]  George Danezis,et al.  Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..

[57]  Yuval Ishai,et al.  Priced Oblivious Transfer: How to Sell Digital Goods , 2001, EUROCRYPT.

[58]  Urs Hengartner Location privacy based on trusted computing and secure logging , 2008, SecureComm.

[59]  Yi Mu,et al.  Constant-Size Dynamic k-TAA , 2006, SCN.

[60]  Prateek Mittal,et al.  ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.

[61]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[62]  Radu Sion,et al.  On the Computational Practicality of Private Information Retrieval , 2006 .

[63]  Felipe Saint-Jean Java Implementation of a Single-Database Computationally Symmetric Private Information Retrieval (cSPIR) Protocol , 2005 .

[64]  Walid G. Aref,et al.  Casper*: Query processing for location services without compromising privacy , 2006, TODS.

[65]  Rafail Ostrovsky,et al.  Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[66]  Tal Malkin,et al.  A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication , 1998, RANDOM.

[67]  Robert H. Deng,et al.  Private Information Retrieval Using Trusted Hardware , 2006, IACR Cryptol. ePrint Arch..

[68]  Benny Pinkas,et al.  Efficient Private Matching and Set Intersection , 2004, EUROCRYPT.

[69]  Johann-Christoph Freytag,et al.  Almost Optimal Private Information Retrieval , 2002, Privacy Enhancing Technologies.

[70]  Vandana Gunupudi,et al.  Generalized Non-Interactive Oblivious Transfer Using Count-Limited Objects with Applications to Secure Mobile Agents , 2008, Financial Cryptography.

[71]  Helen Nissenbaum,et al.  Adnostic: Privacy Preserving Targeted Advertising , 2010, NDSS.

[72]  Ian Goldberg,et al.  Constant-Size Commitments to Polynomials and Their Applications , 2010, ASIACRYPT.

[73]  Daniel J. Solove,et al.  Privacy and Power: Computer Databases and Metaphors for Information Privacy , 2001 .

[74]  Sanjeev Kumar Mishra On Symmetrically Private Information Retrieval , 2000, IACR Cryptol. ePrint Arch..

[75]  Ying Cai,et al.  Location anonymity in continuous location-based services , 2007, GIS.

[76]  Matthew Green,et al.  Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.

[77]  Matthew Richardson,et al.  Targeted, Not Tracked: Client-Side Solutions for Privacy-Friendly Behavioral Advertising , 2011 .

[78]  Thomas Schneider,et al.  Engineering Secure Two-Party Computation Protocols , 2012, Springer Berlin Heidelberg.

[79]  Andris Ambainis,et al.  On Lower Bounds for the Communication Complexity of Private Information Retrieval ∗ , 2000 .

[80]  Nicholas Hopper,et al.  Balancing the shadows , 2010, WPES '10.

[81]  Xiaomin Liu,et al.  Efficient Oblivious Pseudorandom Function with Applications to Adaptive OT and Secure Computation of Set Intersection , 2009, TCC.

[82]  Nick Mathewson,et al.  The pynchon gate: a secure method of pseudonymous mail retrieval , 2005, WPES '05.

[83]  Karen Sparck Jones A statistical interpretation of term specificity and its application in retrieval , 1972 .

[84]  Ian Goldberg,et al.  Practical PIR for electronic commerce , 2011, CCS '11.

[85]  Moni Naor,et al.  Private Information Retrieval by Keywords , 1998, IACR Cryptol. ePrint Arch..

[86]  Nikita Borisov,et al.  A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.

[87]  Ling Liu,et al.  Supporting anonymous location queries in mobile environments with privacygrid , 2008, WWW.

[88]  Paul F. Syverson,et al.  Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[89]  Klim Efremenko,et al.  3-Query Locally Decodable Codes of Subexponential Length , 2008 .

[90]  Marco Gruteser,et al.  USENIX Association , 1992 .

[91]  Rafail Ostrovsky,et al.  Multi-Server Oblivious RAM , 2011, IACR Cryptol. ePrint Arch..

[92]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.

[93]  Radu Sion,et al.  On securing untrusted clouds with cryptography , 2010, WPES '10.

[94]  Ian Goldberg,et al.  Improving the Robustness of Private Information Retrieval , 2007 .

[95]  Roopa Vishwanathan,et al.  Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology , 2009, DBSec.

[96]  Nicholas Hopper,et al.  Hashing it out in public: common failure modes of DHT-based anonymity schemes , 2009, WPES '09.

[97]  A. Khoshgozaran,et al.  SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy , 2008, 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW.

[98]  Urs Hengartner,et al.  A Distributed k-Anonymity Protocol for Location Privacy , 2009, PerCom.

[99]  Sergey Yekhanin,et al.  Locally Decodable Codes and Private Information Retrieval Schemes , 2010, Information Security and Cryptography.

[100]  Abraham Silberschatz,et al.  Database System Concepts , 1980 .

[101]  Dirk Grunwald,et al.  Low-resource routing attacks against tor , 2007, WPES '07.

[102]  Christian Wieschebrink,et al.  Two NP-complete Problems in Coding Theory with an Application in Code Based Cryptography , 2006, 2006 IEEE International Symposium on Information Theory.

[103]  Philippe Gaborit,et al.  A fast private information retrieval protocol , 2008, 2008 IEEE International Symposium on Information Theory.

[104]  Dawn Xiaodong Song,et al.  Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.

[105]  Security Rsa,et al.  TWIRL and RSA Key Size , 2003 .

[106]  Andy Parrish,et al.  Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups , 2010, ISC.

[107]  Dmitri Asonov Querying Databases Privately: A New Approach to Private Information Retrieval , 2004, Lecture Notes in Computer Science.

[108]  Ian Goldberg,et al.  Achieving Efficient Query Privacy for Location Based Services , 2010, Privacy Enhancing Technologies.

[109]  Salvatore J. Stolfo,et al.  Privacy-Preserving Sharing of Sensitive Information , 2010, IEEE Secur. Priv..

[110]  Yang Cui,et al.  The practicality of the keyword search using PIR , 2008, 2008 International Symposium on Information Theory and Its Applications.

[111]  Moni Naor,et al.  Oblivious transfer and polynomial evaluation , 1999, STOC '99.

[112]  Bruce W. Weide,et al.  Using parse tree validation to prevent SQL injection attacks , 2005, SEM '05.

[113]  Matthew K. Wright,et al.  Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.

[114]  Sergey Yekhanin,et al.  Towards 3-query locally decodable codes of subexponential length , 2008, JACM.

[115]  Elisa Bertino,et al.  Position transformation: a location privacy protection method for moving objects , 2008, SPRINGL '08.

[116]  Bernhard E. Boser,et al.  A training algorithm for optimal margin classifiers , 1992, COLT '92.

[117]  Gene Tsudik,et al.  A Privacy-Preserving Index for Range Queries , 2004, VLDB.

[118]  Sean W. Smith,et al.  Practical server privacy with secure coprocessors , 2001, IBM Syst. J..

[119]  Alfred Kobsa,et al.  Tailoring Privacy to Users' Needs , 2001, User Modeling.

[120]  Robert H. Deng Towards Practical Private Information Retrieval , 2006 .

[121]  Hua Lu,et al.  SpaceTwist: Managing the Trade-Offs Among Location Privacy, Query Performance, and Query Accuracy in Mobile Services , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[122]  William I. Gasarch,et al.  A Survey on Private Information Retrieval (Column: Computational Complexity) , 2004, Bull. EATCS.

[123]  Divyakant Agrawal,et al.  Generalizing PIR for Practical Private Retrieval of Public Data , 2010, DBSec.

[124]  Nicholas Hopper,et al.  Scalable onion routing with torsk , 2009, CCS.

[125]  Claudio Bettini,et al.  Privacy in Georeferenced Context-aware Services: A Survey , 2009, PiLBA.

[126]  Urs Hengartner,et al.  Hiding Location Information from Location-Based Services , 2007, 2007 International Conference on Mobile Data Management.

[127]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[128]  Saikat Guha,et al.  Privad: Practical Privacy in Online Advertising , 2011, NSDI.

[129]  Brent Waters,et al.  New Techniques for Private Stream Searching , 2009, TSEC.

[130]  Bernhard Plattner,et al.  Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.

[131]  Rafail Ostrovsky,et al.  Private information storage (extended abstract) , 1997, STOC '97.