{"id":"https://openalex.org/W4405184286","doi":"https://doi.org/10.1145/3658644.3670350","title":"Distributed PIR: Scaling Private Messaging via the Users' Machines","display_name":"Distributed PIR: Scaling Private Messaging via the Users' Machines","publication_year":2024,"publication_date":"2024-12-02","ids":{"openalex":"https://openalex.org/W4405184286","doi":"https://doi.org/10.1145/3658644.3670350"},"language":"en","primary_location":{"id":"doi:10.1145/3658644.3670350","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670350","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670350","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670350","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5115061499","display_name":"Elkana Tovey","orcid":null},"institutions":[{"id":"https://openalex.org/I197251160","display_name":"Hebrew University of Jerusalem","ror":"https://ror.org/03qxff017","country_code":"IL","type":"education","lineage":["https://openalex.org/I197251160"]}],"countries":["IL"],"is_corresponding":true,"raw_author_name":"Elkana Tovey","raw_affiliation_strings":["Hebrew University, Jerusalem, Israel"],"affiliations":[{"raw_affiliation_string":"Hebrew University, Jerusalem, Israel","institution_ids":["https://openalex.org/I197251160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041923564","display_name":"Jonathan Weiss","orcid":"https://orcid.org/0009-0008-0559-6903"},"institutions":[{"id":"https://openalex.org/I197251160","display_name":"Hebrew University of Jerusalem","ror":"https://ror.org/03qxff017","country_code":"IL","type":"education","lineage":["https://openalex.org/I197251160"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Jonathan Weiss","raw_affiliation_strings":["Hebrew University, Jerusalem, Israel"],"affiliations":[{"raw_affiliation_string":"Hebrew University, Jerusalem, Israel","institution_ids":["https://openalex.org/I197251160"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056985040","display_name":"Yossi Gilad","orcid":"https://orcid.org/0000-0003-3475-8322"},"institutions":[{"id":"https://openalex.org/I197251160","display_name":"Hebrew University of Jerusalem","ror":"https://ror.org/03qxff017","country_code":"IL","type":"education","lineage":["https://openalex.org/I197251160"]}],"countries":["IL"],"is_corresponding":false,"raw_author_name":"Yossi Gilad","raw_affiliation_strings":["Hebrew University, Jerusalem, Israel"],"affiliations":[{"raw_affiliation_string":"Hebrew University, Jerusalem, Israel","institution_ids":["https://openalex.org/I197251160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5115061499"],"corresponding_institution_ids":["https://openalex.org/I197251160"],"apc_list":null,"apc_paid":null,"fwci":2.732,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91774079,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1967","last_page":"1981"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8535873293876648},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7623107433319092},{"id":"https://openalex.org/keywords/delegate","display_name":"Delegate","score":0.742267370223999},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.6731153130531311},{"id":"https://openalex.org/keywords/metadata","display_name":"Metadata","score":0.5519409775733948},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4923492670059204},{"id":"https://openalex.org/keywords/private-information-retrieval","display_name":"Private information retrieval","score":0.42202141880989075},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.42056286334991455},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41785088181495667},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3736896514892578},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.35009410977363586},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17070648074150085},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11281028389930725}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8535873293876648},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7623107433319092},{"id":"https://openalex.org/C143273055","wikidata":"https://www.wikidata.org/wiki/Q2382794","display_name":"Delegate","level":2,"score":0.742267370223999},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.6731153130531311},{"id":"https://openalex.org/C93518851","wikidata":"https://www.wikidata.org/wiki/Q180160","display_name":"Metadata","level":2,"score":0.5519409775733948},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4923492670059204},{"id":"https://openalex.org/C99221444","wikidata":"https://www.wikidata.org/wiki/Q1532069","display_name":"Private information retrieval","level":2,"score":0.42202141880989075},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.42056286334991455},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41785088181495667},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3736896514892578},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.35009410977363586},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17070648074150085},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11281028389930725},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3658644.3670350","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670350","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670350","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3658644.3670350","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3658644.3670350","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3658644.3670350","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G7323809569","display_name":null,"funder_award_id":"1104/23","funder_id":"https://openalex.org/F4320323817","funder_display_name":"Universitas Brawijaya"}],"funders":[{"id":"https://openalex.org/F4320323817","display_name":"Universitas Brawijaya","ror":"https://ror.org/01wk3d929"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4405184286.pdf"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W1514221954","https://openalex.org/W1536141561","https://openalex.org/W1579055129","https://openalex.org/W1888844539","https://openalex.org/W2103299932","https://openalex.org/W2154654620","https://openalex.org/W2177209050","https://openalex.org/W2252814878","https://openalex.org/W2595959570","https://openalex.org/W2613280320","https://openalex.org/W2763648389","https://openalex.org/W2763748542","https://openalex.org/W2914982603","https://openalex.org/W2918752259","https://openalex.org/W2969916225","https://openalex.org/W2981660771","https://openalex.org/W3203442625","https://openalex.org/W3214056094","https://openalex.org/W4286255341","https://openalex.org/W4288057739","https://openalex.org/W4376639489","https://openalex.org/W4405184286","https://openalex.org/W6825516401","https://openalex.org/W6930421944"],"related_works":["https://openalex.org/W2031284701","https://openalex.org/W3141203889","https://openalex.org/W1969486489","https://openalex.org/W2156039046","https://openalex.org/W2418771911","https://openalex.org/W2994187804","https://openalex.org/W2960441665","https://openalex.org/W2070558560","https://openalex.org/W2025937185","https://openalex.org/W2091948289"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,27,57,66,126,147],"new":[4],"architecture":[5],"for":[6,106],"metadata-private":[7,127],"messaging":[8,58,112,128],"that":[9,60,78,130,150,165],"counters":[10],"scalability":[11,133],"challenges":[12],"by":[13,49,110,155],"offloading":[14],"most":[15],"computations":[16],"to":[17,40,64,73,84,101],"the":[18,21,35,71,74,85,138,166,171],"clients.":[19],"At":[20],"core":[22],"of":[23,87],"our":[24],"design":[25],"is":[26,125],"distributed":[28,62],"private":[29],"information":[30],"retrieval":[31],"(PIR)":[32],"protocol,":[33],"where":[34],"responder":[36],"delegates":[37,48],"its":[38],"work":[39,72,136,161],"alleviate":[41],"PIR's":[42],"computational":[43],"bottleneck":[44],"and":[45,157,164],"catches":[46],"misbehaving":[47],"efficiently":[50],"verifying":[51],"their":[52],"results.":[53],"We":[54,142],"introduce":[55],"DPIR,":[56],"system":[59,129],"uses":[61],"PIR":[63,118],"let":[65],"server":[67,92],"storing":[68],"messages":[69,88],"delegate":[70],"system's":[75],"clients,":[76],"such":[77],"each":[79],"client":[80,108],"contributes":[81],"proportional":[82],"processing":[83,117],"number":[86],"it":[89],"reads.":[90],"The":[91,123],"removes":[93],"clients":[94],"returning":[95],"invalid":[96],"results,":[97],"which":[98],"DPIR":[99,114,151],"leverages":[100],"integrate":[102],"an":[103],"incentive":[104],"mechanism":[105],"honest":[107],"behavior":[109],"conditioning":[111],"through":[113,144],"on":[115,146],"correctly":[116],"requests":[119],"from":[120],"other":[121],"users.":[122],"result":[124],"asymptotically":[131],"improves":[132,153],"over":[134,159],"prior":[135,160],"with":[137,170],"same":[139],"threat":[140],"model.":[141],"show":[143],"experiments":[145],"prototype":[148],"implementation":[149],"concretely":[152],"performance":[154,167],"3.25\u00d7":[156],"4.31\u00d7":[158],"[3,":[162],"5]":[163],"gap":[168],"grows":[169],"user":[172],"base~size.":[173]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
