{Communication–Computation} trade-offs in {PIR}

A Ali, T Lepoint, S Patel, M Raykova… - 30th USENIX security …, 2021 - usenix.org
Communication–Computation Trade-offs in PIR Page 1 This paper is included in the Proceedings
of the 30th USENIX Security Symposium. August 11–13, 2021 978-1-939133-24-3 Open access to …

XSPIR: efficient symmetrically private information retrieval from Ring-LWE

C Lin, Z Liu, T Malkin - European Symposium on Research in Computer …, 2022 - Springer
Abstract Private Information Retrieval (PIR) allows a client to retrieve one entry from a
database held by a server, while hiding from the server which entry has been retrieved …

Privacy/performance trade-off in private search on bio-medical data

H Perl, Y Mohammed, M Brenner, M Smith - Future Generation Computer …, 2014 - Elsevier
Outsourcing of biomedical data, especially human patient data, for processing is heavily
constrained by legal issues. For instance searching for a biological sequence of amino acids …

Security and Data Analysis

H Perl - 2017 - bonndoc.ulb.uni-bonn.de
In recent years, techniques to automatically analyze lots of data have advanced significantly.
The possibility to gather and analyze large amounts of data has challenged security …

[PDF][PDF] A survey and taxonomy on privacy enhancing technologies

P Zimmermann - 2014 - scholar.archive.org
Due to the continuous increase of data storage eg by Google and Facebook an increasing
need for data protection is created. One basic requirement for implementing data protection …