A Novel Perfect Privacy PIR Scheme for Privacy Critical Applications

2017 
Majority of the business vendors have incorporated the policy-driven privacy setting that greatly disappoints the end user or customer even though the protocol-based privacy assurance is strongly expected. The reason behind this major disagreement between the vendor and the customer is due to the business survival necessity or the business expansion for the vendor and the mandatory technology adoption or the business monopoly creation for the customer. In order to cope up with the exponentially growing business needs, both vendor and customer have to agree upon the protocol-based privacy setting. Therefore, we have proposed a new generic (i.e., applicable for both client-server and peer-to-peer) perfect privacy preserving information retrieval protocol using the concept of Private Information Retrieval (PIR).
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    29
    References
    0
    Citations
    NaN
    KQI
    []