Cryptographic primitives | Theory of cryptography

Private information retrieval

In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-n oblivious transfer, where it is also required that the user should not get information about other database items. One trivial, but very inefficient way to achieve PIR is for the server to send an entire copy of the database to the user. In fact, this is the only possible protocol (in the classical or the quantum setting) that gives the user information theoretic privacy for their query in a single-server setting. There are two ways to address this problem: make the server or assume that there are multiple non-cooperating servers, each having a copy of the database. The problem was introduced in 1995 by Chor, Goldreich, Kushilevitz and Sudan in the information-theoretic setting and in 1997 by Kushilevitz and Ostrovsky in the computational setting. Since then, very efficient solutions have been discovered. Single database (computationally private) PIR can be achieved with constant (amortized) communication and k-database (information theoretic) PIR can be done with communication. (Wikipedia).

Video thumbnail

Understanding Private Browsing

In this video, you’ll learn tips for browsing the web privately. Visit https://edu.gcfglobal.org/en/techsavvy/browsing-privately/1/ to learn even more. We hope you enjoy!

From playlist Internet Tips

Video thumbnail

How to Erase Private Data From Old Drives

PC World explains how to completely erase sensitive data from old drives before recycling or discarding them. Visit www.pcworld.com/videos for more news, reviews and how-to's.

From playlist awareness

Video thumbnail

Privacy Matters

http://privacymatters.nl/

From playlist awareness

Video thumbnail

Big Data

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist Big Data

Video thumbnail

The Internet of Things

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist The Internet

Video thumbnail

Criminal Record

If you are interested in learning more about this topic, please visit http://www.gcflearnfree.org/ to view the entire tutorial on our website. It includes instructional text, informational graphics, examples, and even interactives for you to practice and apply what you've learned.

From playlist The Search

Video thumbnail

Seminar on Applied Geometry and Algebra (SIAM SAGA): Camilla Hollanti

Date: Tuesday, December 8 at 11:00am EST (5:00pm CET) Speaker: Camilla Hollanti, Aalto University Title: Coding theoretic framework for private information retrieval Abstract: Private information retrieval (PIR) addresses the question of how to retrieve data items from a database or clo

From playlist Seminar on Applied Geometry and Algebra (SIAM SAGA)

Video thumbnail

Camilla Hollanti : Almost there: capacity of PIR from coded and colluding servers

CONFERENCE Recording during the thematic meeting : « ALgebraic and combinatorial methods for COding and CRYPTography» the February 21, 2023 at the Centre International de Rencontres Mathématiques (Marseille, France) Filmmaker: Guillaume Hennenfent Find this video and other talks given b

From playlist Mathematics in Science & Technology

Video thumbnail

PIR-with-Default and Applications

A Google TechTalk, 2020/7/30, presented by Karn Seth, Google ABSTRACT: We describe PIR-with-Default, a new cryptographic primitive that enables efficient versions of Private-Join-and-Compute when participants have highly asymmetric input sizes. We discuss potential applications to exposur

From playlist 2020 Google Workshop on Federated Learning and Analytics

Video thumbnail

PROG2005 - 18 - Firestore in Practice

Practical introduction to the use of Firestore with Golang

From playlist 2022 - PROG2005 - Cloud Technologies

Video thumbnail

How to Turn Privacy ON and OFF and ON Again

A Google TechTalk, presented by Salim El Rouayheb, Rutgers University, at the 2021 Google Federated Learning and Analytics Workshop, Nov. 8-10, 2021. For more information about the workshop: https://events.withgoogle.com/2021-workshop-on-federated-learning-and-analytics/#content

From playlist 2021 Google Workshop on Federated Learning and Analytics

Video thumbnail

Nexus Trimester - Alex Vardy (University of California, San Diego)

Private Information Retrieval : Coding Instead of Replication Alex Vardy (University of California, San Diego) March 25, 2016 Abstract: Private information retrieval protocols allow a user to retrieve a data item from a database without revealing any information about the identity of the

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

CERIAS Security: Private Queries in Location Based Services: Anonymizers are not Necessary 3/5

Clip 3/5 Speaker: Gabriel Ghinita · Post-Doctoral Research Associate · Purdue University Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must not be disclosed. Exi

From playlist The CERIAS Security Seminars 2008

Video thumbnail

Protection Of Information Assets | CISA Training Videos

Certified Information System Auditor (CISA) Protection of Information Assets Objectives: • Understand and provide assurance that the enterprise’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets • Detail the

From playlist CISA Training Videos

Video thumbnail

Google Keynote: Federated Aggregation and Privacy

A Google TechTalk, presented by Dan Ramage, Brendan McMahan, & Kallista Bonawitz, 2021/11/8 ABSTRACT: 3 Google researchers talk about the state of the art in federated aggregations and privacy. About the Speakers Brendan McMahan, Google - Brendan McMahan has worked in the fields of onlin

From playlist 2021 Google Workshop on Federated Learning and Analytics

Video thumbnail

Nexus Trimester - Kobbi Nissim (CRCS at Harvard and Ben-Gurion University)

Accessing Data while Preserving Privacy Kobbi Nissim (CRCS at Harvard and Ben-Gurion University) March 31, 2016

From playlist Nexus Trimester - 2016 - Secrecy and Privacy Theme

Video thumbnail

Access 2007: Sorting Records

In this video, you’ll learn more about sorting records in Access 2007. Visit https://www.gcflearnfree.org/access2007/sorting-records/1/ for our text-based lesson. This video includes information on: • Sorting records on text values • Sorting records on numerical values • Clearing a sort

From playlist Microsoft Access 2007

Related pages

Oblivious transfer | One-way function | Phi-hiding assumption | Semantic security | Quadratic residuosity problem | Quantum cryptography | Cryptographic hash function | Shamir's Secret Sharing | Homomorphic encryption | Locally decodable code | Cryptography | Damgård–Jurik cryptosystem | Goldwasser–Micali cryptosystem