PIR with compressed queries and amortized query processing

S Angel, H Chen, K Laine… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …

Compressing vector OLE

E Boyle, G Couteau, N Gilboa, Y Ishai - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Oblivious linear-function evaluation (OLE) is a secure two-party protocol allowing a receiver
to learn any linear combination of a pair of field elements held by a sender. OLE serves as a …

Unobservable communication over fully untrusted infrastructure

S Angel, S Setty - 12th USENIX Symposium on Operating Systems …, 2016 - usenix.org
Keeping communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …

Private stateful information retrieval

S Patel, G Persiano, K Yeo - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Private information retrieval (PIR) is a fundamental tool for preserving query privacy when
accessing outsourced data. All previous PIR constructions have significant costs preventing …

Lower bounds for (batch) PIR with private preprocessing

K Yeo - Annual International Conference on the Theory and …, 2023 - Springer
In this paper, we study (batch) private information retrieval with private preprocessing.
Private information retrieval (PIR) is the problem where one or more servers hold a database …

SHECS-PIR: somewhat homomorphic encryption-based compact and scalable private information retrieval

J Park, M Tibouchi - European Symposium on Research in Computer …, 2020 - Springer
Abstract A Private Information Retrieval (PIR) protocol allows a client to retrieve arbitrary
elements from a database stored in a server without revealing to the server any information …

Optimal fractional repetition codes based on graphs and designs

N Silberstein, T Etzion - IEEE Transactions on Information …, 2015 - ieeexplore.ieee.org
Fractional repetition (FR) codes is a family of codes for distributed storage systems (DSSs)
that allow for uncoded exact repairs having the minimum repair bandwidth. However, in …

Designing optimal middlebox recovery schemes with performance guarantees

Y Kanizo, O Rottenstreich, I Segall… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Enabling functionality in a modern network is achieved through the use of middleboxes.
Middleboxes suffer from temporal unavailability due to various reasons, such as hardware …

Batch and PIR codes and their connections to locally repairable codes

V Skachek - Network Coding and Subspace Designs, 2018 - Springer
Two related families of codes are studied: batch codes and codes for private information
retrieval. These two families can be viewed as natural generalizations of locally repairable …

Service rate region: A new aspect of coded distributed system design

M Aktaş, G Joshi, S Kadhe, F Kazemi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Erasure coding has been recognized as a powerful method to mitigate delays due to slow or
straggling nodes in distributed systems. This work shows that erasure coding of data objects …