<P>The Internet and the worldwide web play an increasingly important role in our private and professional activities, for example in accessing information about cultural, political, economical, medical or scientific information. Many people assume that they can access such information privately.</P>
Locally Decodable Codes and Private Information Retrieval Schemes
โ Scribed by Sergey Yekhanin (auth.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2010
- Tongue
- English
- Leaves
- 95
- Series
- Information Security and Cryptography
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Locally decodable codes (LDCs) are codes that simultaneously provide efficient random access retrieval and high noise resilience by allowing reliable reconstruction of an arbitrary bit of a message by looking at only a small number of randomly chosen codeword bits. Local decodability comes with a certain loss in terms of efficiency โ specifically, locally decodable codes require longer codeword lengths than their classical counterparts. Private information retrieval (PIR) schemes are cryptographic protocols designed to safeguard the privacy of database users. They allow clients to retrieve records from public databases while completely hiding the identity of the retrieved records from database owners. In this book the author provides a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes, obtaining new families of each which have much better parameters than those of previously known constructions, and he also proves limitations of two server PIRs in a restricted setting that covers all currently known schemes. The author's related thesis won the ACM Dissertation Award in 2007, and this book includes some expanded sections and proofs, and notes on recent developments.
โฆ Table of Contents
Front Matter....Pages i-xii
Introduction....Pages 1-17
Locally decodable codes via the point removal method....Pages 19-45
Limitations of the point removal method....Pages 47-59
Private information retrieval....Pages 61-74
Back Matter....Pages 75-82
โฆ Subjects
Data Structures, Cryptology and Information Theory
๐ SIMILAR VOLUMES
<P>The Internet and the worldwide web play an increasingly important role in our private and professional activities, for example in accessing information about cultural, political, economical, medical or scientific information. Many people assume that they can access such information privately.</P>
<p>This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transaction
This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting codes. The applications included demonstrate the importance of these codes in a wide range of everyday technologies, from smartphones to secure communications and transactions.