From: Ravi Pandya <rpandya@netcom.com>
To: cypherpunks@toad.com
Message Hash: c3b44eaa46ddc9e5ee5c6242d7943d4e29ec1d37538172a39034a1a11fbc2eda
Message ID: <2.2.32.19960924222443.006964e8@netcom7.netcom.com>
Reply To: N/A
UTC Datetime: 1996-09-25 05:21:17 UTC
Raw Date: Wed, 25 Sep 1996 13:21:17 +0800
From: Ravi Pandya <rpandya@netcom.com>
Date: Wed, 25 Sep 1996 13:21:17 +0800
To: cypherpunks@toad.com
Subject: Private Information Retrieval
Message-ID: <2.2.32.19960924222443.006964e8@netcom7.netcom.com>
MIME-Version: 1.0
Content-Type: text/plain
This work looks like it might be of interest to readers of this list.
Ravi
--- On Tue, 24 Sep 1996 14:52:08 -0700 (PDT) Scott Dakins
<sjdakins@cs.washington.edu> wrote:
UNIVERSITY OF WASHINGTON
Seattle, Washington 98195
Department of Computer Science and Engineering
Box 352350
(206) 543-1695
COLLOQUIUM
SPEAKER: Benny Chor,
Technion, Haifa, Israel
TITLE: Private Information Retrieval
DATE: Wednesday, September 25, 1996
TIME: 3:30 pm
PLACE: 422 Sieg Hall
HOST: Richard Karp
ABSTRACT:
Publicly accessible databases are an indispensable resource for retrieving
up to date information. But they also pose a significant risk to the
privacy of the user, since a curious database operator can follow the user's
queries and infer what the user is after. Indeed, in cases where the
users' intentions are to be kept secret, users are often cautious about
accessing the database. It can be shown that when accessing a single
database, to completely guarantee the privacy of the user, the whole database
should be downloaded , namely $n$ bits should be communicated (where $n$ is
the number of bits in the database).
In this work, we investigate whether by replicating the database, more
efficient solutions to the private retrieval problem can be obtained.
We describe schemes that enable a user to access $k$ replicated copies of
a database ($k\geq 2$) and privately retrieve information stored in the
database. This means that each individual database gets no information on
the identity of the item retrieved by the user. These schemes use the
replication to gain substantial saving.
In the talk, I will describe the original work on this topic (joint work
with Oded Goldreich, Eyal Kushilevitz, and Madhu Sudan), as well as recent
developments in this area.
Refreshments to follow.
Email: talk-info@cs.washington.edu
Info: http://www.cs.washington.edu
---------------End of Original Message-----------------
Return to September 1996
Return to “Ravi Pandya <rpandya@netcom.com>”