Locally Decodable Codes and Private Information Retrieval Schemes

Locally Decodable Codes and Private Information Retrieval Schemes
Author: Sergey Yekhanin
Publisher: Springer Science & Business Media
Total Pages: 88
Release: 2010-11-02
Genre: Computers
ISBN: 364214358X

Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency – specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve records from public databases while completely hiding the identity of the retrieved records from database owners. In this book the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes, obtaining new families of each which have much better parameters than those of previously known constructions, and he also proves limitations of two server PIRs in a restricted setting that covers all currently known schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.

Essays on Coding Theory

Essays on Coding Theory
Author: Ian F. Blake
Publisher: Cambridge University Press
Total Pages: 473
Release: 2024-03-31
Genre: Computers
ISBN: 1009283375

Brief informal introductions to coding techniques developed for the storage, retrieval, and transmission of large amounts of data.

Cryptology and Network Security

Cryptology and Network Security
Author: Dimitris Gritzalis
Publisher: Springer
Total Pages: 413
Release: 2014-10-17
Genre: Computers
ISBN: 3319122800

This book constitutes the refereed proceedings of the 13th International Conference on Cryptology and Network Security, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised full papers presented together with the abstracts of 3 invited talks were carefully reviewed and selected from 86 submissions. The papers cover topics of interest such as encryption; cryptanalysis; malware analysis; and privacy and identification systems as well as various types of network protocol design and analysis work.

Cloud security mechanisms

Cloud security mechanisms
Author: Neuhaus, Christian
Publisher: Universitätsverlag Potsdam
Total Pages: 88
Release: 2014-10-09
Genre:
ISBN: 3869562811

Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud infrastructures. This report provides introductions to a selection of security mechanisms that were part of the "Cloud Security Mechanisms" seminar in summer term 2013 at HPI.

Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques

Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Author: Maria Serna
Publisher: Springer
Total Pages: 794
Release: 2010-08-27
Genre: Computers
ISBN: 3642153690

This volume contains the papers presented at the 13th International Wo- shop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2010) and the 14th International Workshop on Randomization and Computation (RANDOM 2010), which took place concurrently in Universitat Politècnica de Catalunya (UPC) Barcelona, Spain, during September 1-3, 2010. APPROX focuses on algorithmic and complexity issues surrounding the dev- opment of e?cient approximate solutions to computationally di?cult problems, and was the 13th in the series after Aalborg (1998), Berkeley (1999), Sa- brücken (2000), Berkeley (2001), Rome (2002), Princeton (2003), Cambridge (2004), Berkeley (2005), Barcelona (2006), Princeton (2007), Boston (2008) and Berkeley (2009). RANDOM is concerned with applications of randomness to computational and combinatorial problems, and was the 14th workshop in the - ries following Bologna (1997), Barcelona (1998), Berkeley (1999), Geneva (2000), Berkeley (2001), Harvard (2002), Princeton (2003), Cambridge (2004), Berkeley (2005), Barcelona (2006), Princeton (2007), Boston (2008), and Berkeley (2009).

Querying Databases Privately

Querying Databases Privately
Author: Dmitri Asonov
Publisher: Springer
Total Pages: 122
Release: 2005-01-14
Genre: Language Arts & Disciplines
ISBN: 3540277706

The Internet and the World Wide Web (WWW) play an increasingly imp- tant role in our today's activities. More and more we use the Web to buy goods and to inform ourselves about cultural, political, economical, medical, and scienti?c developments. For example, accessing?ight schedules, me- cal data, or retrieving stock information become common practice in today's world. Many people assume that there is no one who "watches" them when accessing this data. However, sensitive userswho accesselectronic shops(e-shops) might have observedthat this assumptionoften isnot true. In many cases, E-shopstrack the users'"accessbehavior"when browsingthe Web pagesof the e-shopthus deriving "accesspatterns" for individual shoppers. Therefore, this knowledge on access behavior and access patters allows the system to tailor access to Webpagesforthatusertohis/herspeci?cneedsinthefuture. Thistrackingof usersmightbeconsideredharmlessand"acceptable"inmanycases. However, in cases when this information is used to harm a person - for example about the person's health problems - or to violate his/her privacy (for example?nding out about his/her?nancial situation), he/she would like to be sure that such tracking is impossible to protect the user's rights

Property Testing

Property Testing
Author: Oded Goldreich
Publisher: Springer
Total Pages: 370
Release: 2010-10-08
Genre: Computers
ISBN: 364216367X

Property Testing is the study of super-fast (randomized) algorithms for approximate decision making. These algorithms are given direct access to items of a huge data set, and determine, whether this data set has some predetermined (global) property or is far from having this property. Remarkably, this approximate decision is made by accessing a small portion of the data set. This state-of-the-art survey presents a collection of extended abstracts and surveys of leading researchers in property testing and related areas; it reflects the program of a mini-workshop on property testing that took place in January 2010 at the Institute for Computer Science (ITCS), Tsinghua University, Beijing, China. The volume contains two editor's introductions, 10 survey papers and 18 extended abstracts.

Studies in Complexity and Cryptography

Studies in Complexity and Cryptography
Author: Oded Goldreich
Publisher: Springer
Total Pages: 573
Release: 2011-08-03
Genre: Computers
ISBN: 3642226701

This book presents a collection of 36 pieces of scientific work in the areas of complexity theory and foundations of cryptography: 20 research contributions, 13 survey articles, and 3 programmatic and reflective viewpoint statements. These so far formally unpublished pieces were written by Oded Goldreich, some in collaboration with other scientists. The articles included in this book essentially reflect the topical scope of the scientific career of Oded Goldreich now spanning three decades. In particular the topics dealt with include average-case complexity, complexity of approximation, derandomization, expander graphs, hashing functions, locally testable codes, machines that take advice, NP-completeness, one-way functions, probabilistically checkable proofs, proofs of knowledge, property testing, pseudorandomness, randomness extractors, sampling, trapdoor permutations, zero-knowledge, and non-iterative zero-knowledge. All in all, this potpourri of studies in complexity and cryptography constitutes a most valuable contribution to the field of theoretical computer science centered around the personal achievements and views of one of its outstanding representatives.

Emerging Trends in ICT Security

Emerging Trends in ICT Security
Author: Vladimir B. Balakirsky
Publisher: Elsevier Inc. Chapters
Total Pages: 20
Release: 2013-11-06
Genre: Computers
ISBN: 0128070722

We propose a network-type scheme of private information retrieval, presented as a modification of the conventional setup, where the user is replaced with two users, the user-sender and the user-receiver. As a result of communication, the user-receiver becomes informed about the bit located at a certain position of the database, owned by the servers. Each server receives a query from the user-sender that contains information about the position in a hidden form and the server cannot disclose this position. On the basis of the query and the database, each server forms the replica, which is then transmitted to the user-receiver. By combining replicas, the user-receiver decodes the retrieved bit. We present a simple algebraic scheme where the communication complexity and the computational complexity are expressed as functions of the logarithm of the database size. The approaches allow extensions to the one-server scheme, the multi-scheme with noisy replicas of a fixed number of servers, and the authentication of a certain fragment of the database.