Download now Free registration required
The task of retrieving commercial data in the presence of malicious adversaries falls into the general field of Private Information Retrieval (PIR) which is well studied up to date. For example, Ostrovsky and Skeith have already proposed solutions of private searching on streaming data, where a client P queries whether a server stores the data containing a keyword key, and in case that a data contains key, P would like to obliviously retrieve this data such that the corrupted server knows nothing about what is the specified keyword and which data is retrieved. The authors however demonstrate that the OS protocols may not work efficiently in certain applications.
- Format: PDF
- Size: 276.33 KB