Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
PIR with compressed queries and amortized query processing
Private information retrieval (PIR) is a key building block in many privacy-preserving
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …
systems. Unfortunately, existing constructions remain very expensive. This paper introduces …
Piano: extremely simple, single-server PIR with sublinear server computation
We construct a sublinear-time single-server preprocessing Private Information Retrieval
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …
(PIR) scheme with an optimal tradeoff between client storage and server computation (up to …
Single-server private information retrieval with sublinear amortized time
We construct new private-information-retrieval protocols in the single-server setting. Our
schemes allow a client to privately fetch a sequence of database records from a server …
schemes allow a client to privately fetch a sequence of database records from a server …
XPIR: Private information retrieval for everyone
CA Melchor, J Barrier, L Fousse… - Proceedings on Privacy …, 2016 - hal.science
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record
from a database while hiding which from the database administrators. PIR can be achieved …
from a database while hiding which from the database administrators. PIR can be achieved …
Private information retrieval with sublinear online time
We present the first protocols for private information retrieval that allow fast (sublinear-time)
database lookups without increasing the server-side storage requirements. To achieve …
database lookups without increasing the server-side storage requirements. To achieve …
Private information retrieval for coded storage
Private information retrieval scheme for coded data storage is considered in this paper. We
focus on the case where the size of each data record is large and hence only the download …
focus on the case where the size of each data record is large and hence only the download …
Efficient pre-processing PIR without public-key cryptography
Abstract Classically, Private Information Retrieval (PIR) was studied in a setting without any
pre-processing. In this setting, it is well-known that 1) public-key cryptography is necessary …
pre-processing. In this setting, it is well-known that 1) public-key cryptography is necessary …
Optimal single-server private information retrieval
We construct a single-server pre-processing Private Information Retrieval (PIR) scheme with
optimal bandwidth and server computation (up to poly-logarithmic factors), assuming …
optimal bandwidth and server computation (up to poly-logarithmic factors), assuming …
Identifying harmful media in {End-to-End} encrypted communication: Efficient private membership computation
End-to-end encryption (E2EE) poses a challenge for automated detection of harmful media,
such as child sexual abuse material and extremist content. The predominant approach at …
such as child sexual abuse material and extremist content. The predominant approach at …