Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

PIR with compressed queries and amortized query processing

S Angel, H Chen, K Laine… - 2018 IEEE symposium on …, 2018 - ieeexplore.ieee.org
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …

Piano: extremely simple, single-server PIR with sublinear server computation

M Zhou, A Park, W Zheng, E Shi - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
We construct a sublinear-time single-server preprocessing Private Information Retrieval
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …

Single-server private information retrieval with sublinear amortized time

H Corrigan-Gibbs, A Henzinger, D Kogan - … International Conference on …, 2022 - Springer
We construct new private-information-retrieval protocols in the single-server setting. Our
schemes allow a client to privately fetch a sequence of database records from a server …

XPIR: Private information retrieval for everyone

CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record
from a database while hiding which from the database administrators. PIR can be achieved …

Private information retrieval with sublinear online time

H Corrigan-Gibbs, D Kogan - … 39th Annual International Conference on the …, 2020 - Springer
We present the first protocols for private information retrieval that allow fast (sublinear-time)
database lookups without increasing the server-side storage requirements. To achieve …

Private information retrieval for coded storage

TH Chan, SW Ho, H Yamamoto - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Private information retrieval scheme for coded data storage is considered in this paper. We
focus on the case where the size of each data record is large and hence only the download …

Efficient pre-processing PIR without public-key cryptography

A Ghoshal, M Zhou, E Shi - Annual International Conference on the Theory …, 2024 - Springer
Abstract Classically, Private Information Retrieval (PIR) was studied in a setting without any
pre-processing. In this setting, it is well-known that 1) public-key cryptography is necessary …

Optimal single-server private information retrieval

M Zhou, WK Lin, Y Tselekounis, E Shi - … on the Theory and Applications of …, 2023 - Springer
We construct a single-server pre-processing Private Information Retrieval (PIR) scheme with
optimal bandwidth and server computation (up to poly-logarithmic factors), assuming …

Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation

A Kulshrestha, J Mayer - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …