Oct. 6, 2023, 11:54 a.m. |

IACR News www.iacr.org

ePrint Report: Towards Practical Doubly-Efficient Private Information Retrieval

Hiroki Okada, Rachel Player, Simon Pohmann, Christian Weinert


Private information retrieval (PIR) protocols allow clients to access database entries without revealing the queried indices. They have many real-world applications, including privately querying patent-, compromised credential-, and contact databases. While existing PIR protocols that have been implemented perform reasonably well in practice, they all have suboptimal asymptotic complexities.


A line of work has explored so-called doubly-efficient PIR (DEPIR), which refers to single-server PIR …

access applications christian clients compromised credential database databases eprint report information patent player private protocols report world

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Senior Security Researcher - Linux MacOS EDR (Cortex)

@ Palo Alto Networks | Tel Aviv-Yafo, Israel

Sr. Manager, NetSec GTM Programs

@ Palo Alto Networks | Santa Clara, CA, United States

SOC Analyst I

@ Fortress Security Risk Management | Cleveland, OH, United States