Private Information Retrieval

Private Information Retrieval

Private Information Retrieval

Elisa Bertino / Russell Paulet / Xun Yi

50,52 €
IVA incluido
Consulta disponibilidad
Editorial:
Morgan and Claypool Publishers
Año de edición:
2013
ISBN:
9781627051538
50,52 €
IVA incluido
Consulta disponibilidad

Selecciona una librería:

  • Librería 7artes
  • Donde los libros
  • Librería Elías (Asturias)
  • Librería Kolima (Madrid)
  • Librería Proteo (Málaga)

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server.The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered.Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors.Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.Table of Contents: Preface / Acknowledgments / Classic Private Information Retrieval / FHE-Based Private Information Retrieval / Private Data Warehouse Queries / Privacy-Preserving Location-Based Queries / Discussion and Future Work / Bibliography / Authors’ Biographies 3

Artículos relacionados

  • Privacy, Intrusion Detection and Response
    Peyman Kabiri
    Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, ...
    Disponible

    255,72 €

  • TLS Cryptography In-Depth
    Dr. Paul Duplys / Dr. Roland Schmitz
    A practical introduction to modern cryptography using the Transport Layer Security protocol as the primary referenceKey FeaturesLearn about real-world cryptographic pitfalls and how to avoid themUnderstand past attacks on TLS, how these attacks worked, and how they were fixedDiscover the inner workings of modern cryptography and its application within TLSPurchase of the print o...
    Disponible

    60,18 €

  • Foundations of Cryptography
    Goldreich Oded / Oded Goldreich
    ...
    Disponible

    87,03 €

  • Quantum Information Theory
    Mark M. Wilde / Mark MWilde
    ...
    Disponible

    105,66 €

  • Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms
    In an era of rapid technological advancements, blockchain technology has emerged as a groundbreaking solution for decentralized trust and immutable record-keeping. Frameworks for Blockchain Standards, Tools, Testbeds, and Platforms delves into the intricate world of blockchain, offering a comprehensive exploration of its various dimensions. At its core, blockchain disrupts the ...
    Disponible

    373,22 €

  • Privacy Risk Analysis
    Daniel Le Métayer / Sourya Joyee De
    Privacy Risk Analysis fills a gap in the existing literature by providing an introduction to the basic notions, requirements, and main steps of conducting a privacy risk analysis.The deployment of new information technologies can lead to significant privacy risks and a privacy impact assessment should be conducted before designing a product or system that processes personal dat...
    Consulta disponibilidad

    67,66 €