|
|
|
|
LEADER |
06793cam a2200781Ii 4500 |
001 |
26414 |
005 |
20150319123322.0 |
006 |
m eo d |
007 |
cr cn||||m|||a |
008 |
131017s2013 caua fob 000 0 eng d |
019 |
# |
# |
|a 862048561
|a 868160728
|
020 |
# |
# |
|a 9781627051545
|q (electronic bk.)
|
020 |
# |
# |
|a 1627051546
|q (electronic bk.)
|
020 |
# |
# |
|q (pbk.)
|z 9781627051538
|
020 |
# |
# |
|a 1627051538
|
020 |
# |
# |
|a 9781627051538
|
024 |
7 |
# |
|a 10.2200/S00524ED1V01Y201307SPT005
|2 doi
|
035 |
# |
# |
|a (OCoLC)860910026
|z (OCoLC)862048561
|z (OCoLC)868160728
|
037 |
# |
# |
|a CL0500000354
|b Safari Books Online
|
040 |
# |
# |
|a CaBNvSL
|b eng
|c J2I
|d UMI
|d DEBSZ
|d EBLCP
|d E7B
|d WAU
|d YDXCP
|d N$T
|d COO
|d UIU
|d J2I
|d OCLCF
|d OCLCQ
|e pn
|e rda
|
049 |
# |
# |
|a MAIN
|
050 |
# |
4 |
|a ZA3075
|b .Y56 2013
|
072 |
# |
7 |
|a LAN
|x 025000
|2 bisacsh
|
082 |
0 |
4 |
|a 025.524
|2 23
|
100 |
1 |
# |
|a Yi, Xun
|c (College teacher),
|e author.
|
245 |
1 |
0 |
|a Private information retrieval /
|c Xun Yi, Russell Paulet, Elisa Bertino.
|
264 |
# |
1 |
|a [San Rafael, California] :
|b Morgan & Claypool Publishers,
|c [2013]
|
300 |
# |
# |
|a 1 online resource (xv, 98 pages) :
|b illustrations.
|
336 |
# |
# |
|a text
|b txt
|2 rdacontent
|
337 |
# |
# |
|a computer
|b c
|2 rdamedia
|
338 |
# |
# |
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
# |
|a Synthesis lectures on information security, privacy, & trust,
|v #5
|x 1945-9750 ;
|
504 |
# |
# |
|a Includes bibliographical references (pages 87-95).
|
505 |
0 |
# |
|a 1. Classic private information retrieval -- 1.1 Introduction -- 1.2 Security model for private information retrieval -- 1.3 Private information retrieval protocols -- 1.3.1 Kushilevitz-Ostrovsky PIR protocol -- 1.3.2 Chang PIR protocol -- 1.3.3 Gentry-Razman PIR protocol -- 1.4 Security model for oblivious transfer -- 1.5 Oblivious transfer protocols -- 1.5.1 Even-Goldreich-Lempel OT12 protocol -- 1.5.2 Naor-Pinkas OTn1 protocol -- 1.5.3 Naor-Pinkas OTnkx1 protocol -- 1.6 Relationship between PIR and OT -- 1.7 Conclusion.
|
505 |
8 |
# |
|a 2. FHE-based private information retrieval -- 2.1 Introduction -- 2.2 Fully homomorphic encryption -- 2.2.1 FHE definition -- 2.2.2 DGHV somewhat scheme -- 2.3 Generic single-database PIR from FHE -- 2.3.1 Response generation circuit -- 2.3.2 Generic single-database PIR from FHE -- 2.3.3 Generic single-database PBR from FHE -- 2.4 Practical single-database PIR from FHE -- 2.4.1 A variant of DGHV somewhat scheme -- 2.4.2 Practical single-database PBR from V-DGHV scheme -- 2.5 Security analysis -- 2.6 Performance analysis -- 2.6.1 Theoretic performance analysis -- 2.6.2 Experiment -- 2.6.3 Comparison -- 2.7 Conclusion.
|
505 |
8 |
# |
|a 3. Private data warehouse queries -- 3.1 Introduction -- 3.2 Boneh-Goh-Nissim cryptosystem -- 3.2.1 Bilinear group -- 3.2.2 Boneh-Goh-Nissim encryption scheme -- 3.2.3 Homomorphic properties -- 3.3 Private data warehouse queries -- 3.3.1 Model -- 3.3.2 Private cell retrieval -- 3.3.3 Private OLAP operations -- 3.3.4 Private statistical analysis -- 3.4 Security and performance analysis -- 3.4.1 Security analysis -- 3.4.2 Performance analysis -- 3.5 Experimental evaluation -- 3.6 Conclusion.
|
505 |
8 |
# |
|a 4. Privacy-preserving location-based queries -- 4.1 Introduction -- 4.2 Model -- 4.2.1 Notations -- 4.2.2 System model -- 4.2.3 Security model -- 4.3 Privacy-preserving location-based query -- 4.3.1 Protocol summary -- 4.3.2 Initialization -- 4.3.3 Oblivious transfer phase -- 4.3.4 Private information retrieval phase -- 4.4 Security analysis -- 4.4.1 Client's security -- 4.4.2 Server's security -- 4.5 Performance analysis -- 4.5.1 Computation -- 4.5.2 Communication -- 4.6 Experimental evaluation -- 4.6.1 Experimental parameters -- 4.6.2 Experimental results -- 4.7 Conclusion.
|
505 |
8 |
# |
|a 5. Discussion and future work -- Bibliography -- Authors' biographies.
|
520 |
3 |
# |
|a This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.
|
588 |
0 |
# |
|a Online resource; title from PDF title page (Morgan & Claypool; viewed on October 17, 2013).
|
650 |
# |
0 |
|a Information retrieval.
|
650 |
# |
0 |
|a Database security.
|
650 |
# |
0 |
|a Confidential communications.
|
650 |
# |
4 |
|a Computer networks
|x Security measures.
|
650 |
# |
4 |
|a Computer security.
|
650 |
# |
4 |
|a Information retrieval.
|
650 |
# |
4 |
|a Web databases.
|
650 |
# |
7 |
|a LANGUAGE ARTS & DISCIPLINES
|x General.
|x Library & Information Science
|2 bisacsh
|
650 |
# |
7 |
|a Confidential communications.
|0 (OCoLC)fst00874701
|2 fast
|
650 |
# |
7 |
|a Database security.
|0 (OCoLC)fst00888063
|2 fast
|
650 |
# |
7 |
|a Information retrieval.
|0 (OCoLC)fst00972619
|2 fast
|
653 |
# |
# |
|a private information retrieval
|
653 |
# |
# |
|a oblivious transfer
|
653 |
# |
# |
|a homomorphic encryption
|
653 |
# |
# |
|a private data warehouse queries
|
653 |
# |
# |
|a private location-based queries
|
655 |
# |
4 |
|a Electronic books.
|
655 |
# |
0 |
|a Electronic books.
|
700 |
1 |
# |
|a Paulet, Russell,
|e author.
|
700 |
1 |
# |
|a Bertino, Elisa,
|e author.
|
776 |
0 |
8 |
|a Yi, Xun.
|d San Rafael : Morgan & Claypool, 2013
|i Print version:
|t Private information retrieval.
|w (OCoLC)847941552
|z 1627051538
|
830 |
# |
0 |
|a Synthesis lectures on information security, privacy and trust ;
|v #5.
|x 1945-9742
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=646835
|z View fulltext via EzAccess
|
938 |
# |
# |
|a EBL - Ebook Library
|b EBLB
|n EBL1441170
|
938 |
# |
# |
|a ebrary
|b EBRY
|n ebr10775373
|
938 |
# |
# |
|a EBSCOhost
|b EBSC
|n 646835
|
938 |
# |
# |
|a YBP Library Services
|b YANK
|n 11210044
|