Welcome to P K Kelkar Library, Online Public Access Catalogue (OPAC)

Private information retrieval / (Record no. 562026)

000 -LEADER
fixed length control field 06335nam a2200709 i 4500
001 - CONTROL NUMBER
control field 6813412
003 - CONTROL NUMBER IDENTIFIER
control field IEEE
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20200413152911.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m eo d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn |||m|||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 131017s2013 caua foab 000 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781627051545
Qualifying information electronic bk.
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781627051538
Qualifying information pbk.
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.2200/S00524ED1V01Y201307SPT005
Source of number or code doi
035 ## - SYSTEM CONTROL NUMBER
System control number (CaBNVSL)swl00402799
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)860910026
040 ## - CATALOGING SOURCE
Original cataloging agency CaBNVSL
Language of cataloging eng
Description conventions rda
Transcribing agency CaBNVSL
Modifying agency CaBNVSL
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number ZA3075
Item number .Y56 2013
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 025.524
Edition number 23
090 ## - LOCALLY ASSIGNED LC-TYPE CALL NUMBER (OCLC); LOCAL CALL NUMBER (RLIN)
Classification number (OCLC) (R) ; Classification number, CALL (RLIN) (NR)
Local cutter number (OCLC) ; Book number/undivided call number, CALL (RLIN) MoCl
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Yi, Xun.,
Relator term author.
245 10 - TITLE STATEMENT
Title Private information retrieval /
Statement of responsibility, etc. Xun Yi, Russell Paulet, Elisa Bertino.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture San Rafael, California (1537 Fourth Street, San Rafael, CA 94901 USA) :
Name of producer, publisher, distributor, manufacturer Morgan & Claypool,
Date of production, publication, distribution, manufacture, or copyright notice 2013.
300 ## - PHYSICAL DESCRIPTION
Extent 1 PDF (xv, 98 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Source rdacontent
337 ## - MEDIA TYPE
Media type term electronic
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term online resource
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Synthesis lectures on information security, privacy, & trust,
International Standard Serial Number 1945-9750 ;
Volume/sequential designation # 5
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: World Wide Web.
538 ## - SYSTEM DETAILS NOTE
System details note System requirements: Adobe Acrobat Reader.
500 ## - GENERAL NOTE
General note Part of: Synthesis digital library of engineering and computer science.
500 ## - GENERAL NOTE
General note Series from website.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (pages 87-95).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note 1. Classic private information retrieval -- 1.1 Introduction -- 1.2 Security model for private information retrieval -- 1.3 Private information retrieval protocols -- 1.3.1 Kushilevitz-Ostrovsky PIR protocol -- 1.3.2 Chang PIR protocol -- 1.3.3 Gentry-Razman PIR protocol -- 1.4 Security model for oblivious transfer -- 1.5 Oblivious transfer protocols -- 1.5.1 Even-Goldreich-Lempel OT12 protocol -- 1.5.2 Naor-Pinkas OTn1 protocol -- 1.5.3 Naor-Pinkas OTnkx1 protocol -- 1.6 Relationship between PIR and OT -- 1.7 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2. FHE-based private information retrieval -- 2.1 Introduction -- 2.2 Fully homomorphic encryption -- 2.2.1 FHE definition -- 2.2.2 DGHV somewhat scheme -- 2.3 Generic single-database PIR from FHE -- 2.3.1 Response generation circuit -- 2.3.2 Generic single-database PIR from FHE -- 2.3.3 Generic single-database PBR from FHE -- 2.4 Practical single-database PIR from FHE -- 2.4.1 A variant of DGHV somewhat scheme -- 2.4.2 Practical single-database PBR from V-DGHV scheme -- 2.5 Security analysis -- 2.6 Performance analysis -- 2.6.1 Theoretic performance analysis -- 2.6.2 Experiment -- 2.6.3 Comparison -- 2.7 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3. Private data warehouse queries -- 3.1 Introduction -- 3.2 Boneh-Goh-Nissim cryptosystem -- 3.2.1 Bilinear group -- 3.2.2 Boneh-Goh-Nissim encryption scheme -- 3.2.3 Homomorphic properties -- 3.3 Private data warehouse queries -- 3.3.1 Model -- 3.3.2 Private cell retrieval -- 3.3.3 Private OLAP operations -- 3.3.4 Private statistical analysis -- 3.4 Security and performance analysis -- 3.4.1 Security analysis -- 3.4.2 Performance analysis -- 3.5 Experimental evaluation -- 3.6 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4. Privacy-preserving location-based queries -- 4.1 Introduction -- 4.2 Model -- 4.2.1 Notations -- 4.2.2 System model -- 4.2.3 Security model -- 4.3 Privacy-preserving location-based query -- 4.3.1 Protocol summary -- 4.3.2 Initialization -- 4.3.3 Oblivious transfer phase -- 4.3.4 Private information retrieval phase -- 4.4 Security analysis -- 4.4.1 Client's security -- 4.4.2 Server's security -- 4.5 Performance analysis -- 4.5.1 Computation -- 4.5.2 Communication -- 4.6 Experimental evaluation -- 4.6.1 Experimental parameters -- 4.6.2 Experimental results -- 4.7 Conclusion --
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5. Discussion and future work -- Bibliography -- Authors' biographies.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Abstract freely available; full-text restricted to subscribers or individual document purchasers.
510 0# - CITATION/REFERENCES NOTE
Name of source Compendex
510 0# - CITATION/REFERENCES NOTE
Name of source INSPEC
510 0# - CITATION/REFERENCES NOTE
Name of source Google scholar
510 0# - CITATION/REFERENCES NOTE
Name of source Google book search
520 3# - SUMMARY, ETC.
Summary, etc. This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.
530 ## - ADDITIONAL PHYSICAL FORM AVAILABLE NOTE
Additional physical form available note Also available in print.
588 ## - SOURCE OF DESCRIPTION NOTE
Source of description note Title from PDF title page (viewed on October 17, 2013).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Information retrieval.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Database security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Confidential communications
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term private information retrieval
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term oblivious transfer
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term homomorphic encryption
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term private data warehouse queries
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term private location-based queries
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Paulet, Russell.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Bertino, Elisa.,
Relator term author.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781627051538
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis digital library of engineering and computer science.
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Synthesis lectures on information security, privacy, and trust ;
Volume/sequential designation # 5.
International Standard Serial Number 1945-9750
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to resource
Uniform Resource Identifier http://ieeexplore.ieee.org/servlet/opac?bknumber=6813412
856 40 - ELECTRONIC LOCATION AND ACCESS
Materials specified Abstract with links to full text
Uniform Resource Identifier http://dx.doi.org/10.2200/S00524ED1V01Y201307SPT005
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Date acquired Barcode Date last seen Price effective from Koha item type
        PK Kelkar Library, IIT Kanpur PK Kelkar Library, IIT Kanpur 2020-04-13 EBKE526 2020-04-13 2020-04-13 E books

Powered by Koha