Anonymous (nobody@replay.com)
Thu, 10 Sep 1998 19:45:31 +0200
} Seminar at Bell Labs:
}
} Tuesday 4, 2pm: Tal Malkin (MIT Lab for Computer Science, currently
} visiting IBM T.J. Watson Research Center)
} Room/Time: MH 2A-358, 2pm
}
} Title/Abstract: "Survey on Private Information Retrieval"
}
} Private information retrieval (PIR) is a relatively new line of research
} in cryptography, focusing on methods for efficient extraction of
} information from a database, while preventing the database from learning
} which piece of information was retrieved. In this talk I will survey
} the work done in this field, and the major problems which are still
} open. I will give an overview of results in different models for this
} problem, and as time permits will go into more detail on some of the
} ideas and techniques used. I will also mention extensions of the PIR
} model, where additional properties are required. The talk is based
} on works by the following authors: Chor-Goldreich-Kushilevitz-Sudan
} (who introduced PIR), Ambainis, Chor-Gilboa, Kushilevitz-Ostrovsky,
} Cachin-Stadler, Ostrovsky-Shoup, Gertner-Ishai-Kushilevitz-Malkin,
} Gertner-Goldwasser-Malkin, DiCrecenzo-Ishai-Ostrovsky, Chor-Gilboa-Naor.
It is easy to send messages anonymously, but not so easy to receive them.
PIR could be used for anonymous message retrieval. A database could
hold messages for a variety of anonymous parties, then people can
connect to the DB and download their own messages, without the DB (or
an eavesdropper) able to tell which messages they are downloading.
The early protocols were prohibitivelly expensive, but this list of
references might be the start of a literature search to see whether
current methods are practical.
The following archive was created by hippie-mail 7.98617-22 on Sat Apr 10 1999 - 01:13:58