Jan. 30, 2023, 2:10 a.m. | Stanislav Kruglik, Son Hoang Dau, Han Mao Kiah, Huaxiong Wang

cs.CR updates on arXiv.org arxiv.org

Private Information Retrieval (PIR) schemes allow a client to retrieve any
file of interest, while hiding the file identity from the database servers. In
contrast to most existing PIR schemes that assume honest-but-curious servers,
we study the case of dishonest servers. The latter provide incorrect answers
and try to persuade the client to output the wrong result. We introduce several
PIR schemes with information-theoretic privacy and result verification for the
case of two servers. Security guarantees can be information-theoretical or …

case client database download file identity information interest privacy private rate result server servers study verification

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Engineers

@ D. E. Shaw Research | New York City

Cybersecurity Consultant- Governance, Risk, and Compliance team

@ EY | Tel Aviv, IL, 6706703

Professional Services Consultant

@ Zscaler | Escazú, Costa Rica

IT Security Analyst

@ Briggs & Stratton | Wauwatosa, WI, US, 53222

Cloud DevSecOps Engineer - Team Lead

@ Motorola Solutions | Krakow, Poland