{"id":"https://openalex.org/W310513986","doi":"https://doi.org/10.1007/978-3-662-43936-4_22","title":"Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database","display_name":"Practical Private Information Retrieval from a Time-Varying, Multi-attribute, and Multiple-Occurrence Database","publication_year":2014,"publication_date":"2014-01-01","ids":{"openalex":"https://openalex.org/W310513986","doi":"https://doi.org/10.1007/978-3-662-43936-4_22","mag":"310513986"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-662-43936-4_22","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-43936-4_22","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-43936-4_22.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-43936-4_22.pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011460496","display_name":"Giovanni Di Crescenzo","orcid":"https://orcid.org/0000-0002-5138-1144"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Giovanni Di Crescenzo","raw_affiliation_strings":["Applied Communication Sciences, NJ, USA","Applied Communication Sciences, USA"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Applied Communication Sciences, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086150939","display_name":"Debra L. Cook","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Debra Cook","raw_affiliation_strings":["Applied Communication Sciences, NJ, USA","Applied Communication Sciences, USA"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Applied Communication Sciences, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056172120","display_name":"Allen McIntosh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Allen McIntosh","raw_affiliation_strings":["Applied Communication Sciences, NJ, USA","Applied Communication Sciences, USA"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Applied Communication Sciences, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5052263278","display_name":"Euthimios Panagos","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Euthimios Panagos","raw_affiliation_strings":["Applied Communication Sciences, NJ, USA","Applied Communication Sciences, USA"],"affiliations":[{"raw_affiliation_string":"Applied Communication Sciences, NJ, USA","institution_ids":[]},{"raw_affiliation_string":"Applied Communication Sciences, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011460496"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.5386,"has_fulltext":true,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89689045,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"339","last_page":"355"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8485868573188782},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.6534265279769897},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.634976863861084},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.5703635811805725},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5408251285552979},{"id":"https://openalex.org/keywords/view","display_name":"View","score":0.534753680229187},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.500394344329834},{"id":"https://openalex.org/keywords/database-server","display_name":"Database server","score":0.487403929233551},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.4641370177268982},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.435243159532547},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.4290015697479248},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4140135943889618},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21968159079551697},{"id":"https://openalex.org/keywords/database-design","display_name":"Database design","score":0.21674290299415588},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.15698572993278503}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485868573188782},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.6534265279769897},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.634976863861084},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.5703635811805725},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5408251285552979},{"id":"https://openalex.org/C54239708","wikidata":"https://www.wikidata.org/wiki/Q1329910","display_name":"View","level":3,"score":0.534753680229187},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.500394344329834},{"id":"https://openalex.org/C205295232","wikidata":"https://www.wikidata.org/wiki/Q76320","display_name":"Database server","level":2,"score":0.487403929233551},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.4641370177268982},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.435243159532547},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.4290015697479248},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4140135943889618},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21968159079551697},{"id":"https://openalex.org/C148840519","wikidata":"https://www.wikidata.org/wiki/Q1049878","display_name":"Database design","level":2,"score":0.21674290299415588},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15698572993278503},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-662-43936-4_22","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-43936-4_22","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-43936-4_22.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01284868v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01284868","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"28th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2014, Vienna, Austria. pp.339-355, &#x27E8;10.1007/978-3-662-43936-4_22&#x27E9;","raw_type":"Conference papers"}],"best_oa_location":{"id":"doi:10.1007/978-3-662-43936-4_22","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-662-43936-4_22","pdf_url":"https://link.springer.com/content/pdf/10.1007/978-3-662-43936-4_22.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320333051","display_name":"Intelligence Advanced Research Projects Activity","ror":"https://ror.org/01v3fsc55"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W310513986.pdf","grobid_xml":"https://content.openalex.org/works/W310513986.grobid-xml"},"referenced_works_count":26,"referenced_works":["https://openalex.org/W28930810","https://openalex.org/W288540452","https://openalex.org/W1756608328","https://openalex.org/W1822223425","https://openalex.org/W1878874188","https://openalex.org/W1889757464","https://openalex.org/W1988374166","https://openalex.org/W2001154722","https://openalex.org/W2027471022","https://openalex.org/W2043508455","https://openalex.org/W2073346043","https://openalex.org/W2094630003","https://openalex.org/W2100613392","https://openalex.org/W2117362057","https://openalex.org/W2147929033","https://openalex.org/W2154654620","https://openalex.org/W2161214567","https://openalex.org/W2404098708","https://openalex.org/W2478708596","https://openalex.org/W2481712540","https://openalex.org/W2497632684","https://openalex.org/W2561675875","https://openalex.org/W2572799557","https://openalex.org/W2619633776","https://openalex.org/W2990399857","https://openalex.org/W4242080281"],"related_works":["https://openalex.org/W1526122737","https://openalex.org/W1513339978","https://openalex.org/W2025894054","https://openalex.org/W2410380434","https://openalex.org/W2569655902","https://openalex.org/W2033980616","https://openalex.org/W2079690139","https://openalex.org/W2156873116","https://openalex.org/W2501729297","https://openalex.org/W1672478751"],"abstract_inverted_index":{"We":[0,27],"study":[1,34],"the":[2,33,93,150,165,171],"problem":[3],"of":[4,35,42,167],"privately":[5],"performing":[6],"database":[7,22,61,70,94,102,168],"queries":[8],"(i.e.,":[9,118],"keyword":[10,43,82],"searches":[11],"and":[12,45,59,81,126,141],"conjunctions":[13],"over":[14],"them),":[15],"where":[16,109,184],"a":[17,29,51,56,67,100,106,115,119,192],"server":[18,88],"provides":[19],"its":[20],"own":[21],"for":[23,32,154,176],"client":[24],"query-based":[25],"access.":[26],"propose":[28],"cryptographic":[30],"model":[31,108],"such":[36],"protocols,by":[37],"expanding":[38],"previous":[39,75],"well-studied":[40],"models":[41],"search":[44],"private":[46,69,78,101],"information":[47,79,134,146],"retrieval":[48,71,80,103],"to":[49,114,137,149],"incorporate":[50],"more":[52],"practical":[53,175],"data":[54,111],"model:":[55],"time-varying,":[57],"multi-attribute":[58],"multiple-occurrence":[60],"table.":[62],"Our":[63,96],"first":[64],"result":[65,98],"is":[66,99,112,135,147,174,190],"2-party":[68],"protocol.":[72],"Like":[73],"all":[74,157],"work":[76],"in":[77,92,105,160,164,181],"search,":[83],"this":[84],"protocol":[85,104],"still":[86],"satisfies":[87],"time":[89,161,188],"complexity":[90],"linear":[91],"size.":[95],"main":[97],"3-party":[107],"encrypted":[110],"outsourced":[113],"third":[116,151],"party":[117],"cloud":[120],"server),":[121],"satisfying":[122],"highly":[123],"desirable":[124],"privacy":[125],"efficiency":[127],"properties;":[128],"most":[129],"notably:":[130],"(1)":[131],"no":[132],"unintended":[133],"leaked":[136,148],"clients":[138],"or":[139],"servers,":[140],"only":[142,162,191],"minimal":[143],"\u2018access":[144],"pattern\u2019":[145],"party;":[152],"(2)":[153],"each":[155],"query,":[156],"parties":[158],"run":[159],"logarithmic":[163],"number":[166],"records;":[169],"(3)":[170],"protocol\u2019s":[172],"runtime":[173],"real-life":[177],"applications,":[178],"as":[179],"shown":[180],"our":[182],"implementation":[183],"we":[185],"achieve":[186],"response":[187],"that":[189],"small":[193],"constant":[194],"slower":[195],"than":[196],"commercial":[197],"non-private":[198],"protocols":[199],"like":[200],"MySQL.":[201]},"counts_by_year":[{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2016-06-24T00:00:00"}
