{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T21:20:25Z","timestamp":1725744025495},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642398834"},{"type":"electronic","value":"9783642398841"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39884-1_33","type":"book-chapter","created":{"date-parts":[[2013,8,4]],"date-time":"2013-08-04T21:02:52Z","timestamp":1375650172000},"page":"386-394","source":"Crossref","is-referenced-by-count":8,"title":["Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates"],"prefix":"10.1007","author":[{"given":"Justin","family":"Cappos","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","first-page":"565","volume-title":"CCS 2008","author":"J. Cappos","year":"2008","unstructured":"Cappos, J., Samuel, J., Baker, S., Hartman, J.: A Look in the Mirror: Attacks on Package Managers. In: CCS 2008, pp. 565\u2013574. ACM, New York (2008)"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"965","DOI":"10.1145\/293347.293350","volume":"45","author":"B. Chor","year":"1998","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. Journal of the ACM\u00a045, 965\u2013982 (1998)","journal-title":"Journal of the ACM"},{"key":"33_CR3","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s10207-010-0105-2","volume":"9","author":"X. Ding","year":"2010","unstructured":"Ding, X., Yang, Y., Deng, R., Wang, S.: A new hardware-assisted PIR with O(n) shuffle cost. International Journal of Information Security\u00a09, 237\u2013252 (2010), 10.1007\/s10207-010-0105-2","journal-title":"International Journal of Information Security"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Ostrovsky, R., Shoup, V.: Private information storage (extended abstract). In: STOC, pp. 294\u2013303 (1997)","DOI":"10.1145\/258533.258606"},{"key":"33_CR5","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: FOCS 1997, pp. 364\u2013373 (October 1997)"},{"key":"33_CR6","unstructured":"Beimel, A., Ishai, Y., Kushilevitz, E., Fran\u00e7ois Raymond, J.: Breaking the O(n 1\/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval. In: FOCS 2002, pp. 261\u2013270 (2002)"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1007\/3-540-48910-X_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201999","author":"C. Cachin","year":"1999","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol.\u00a01592, pp. 402\u2013414. Springer, Heidelberg (1999)"},{"key":"33_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-36467-6_16","volume-title":"Privacy Enhancing Technologies","author":"D. Asonov","year":"2003","unstructured":"Asonov, D., Freytag, J.-C.: Almost Optimal Private Information Retrieval. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol.\u00a02482, pp. 209\u2013223. Springer, Heidelberg (2003)"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/3-540-63165-8_196","volume-title":"Automata, Languages and Programming","author":"A. Ambainis","year":"1997","unstructured":"Ambainis, A.: Upper bound on communication complexity of private information retrieval. In: Degano, P., Gorrieri, R., Marchetti-Spaccamela, A. (eds.) ICALP 1997. LNCS, vol.\u00a01256, pp. 401\u2013407. Springer, Heidelberg (1997)"},{"key":"33_CR10","unstructured":"Achieving Practical Private Information Retrieval (Panel @ Securecomm 2006), \n                    \n                      http:\/\/www.cs.sunysb.edu\/~sion\/research\/PIR.Panel.Securecomm.2006\/"},{"key":"33_CR11","unstructured":"Sion, R.: On the Computational Practicality of Private Information Retrieval. In: NDSS 2007 (2007)"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-27576-0_13","volume-title":"Financial Cryptography and Data Security","author":"F. Olumofin","year":"2012","unstructured":"Olumofin, F., Goldberg, I.: Revisiting the computational practicality of private information retrieval. In: Danezis, G. (ed.) FC 2011. LNCS, vol.\u00a07035, pp. 158\u2013172. Springer, Heidelberg (2012)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Cappos, J.: Avoiding Theoretical Optimality to Efficiently and Privately Retrieve Security Updates (full version). Technical Report TR\u2013CSE\u20132013\u201301, Department of Computer Science and Engineering, NYU Poly (February 2013)","DOI":"10.1007\/978-3-642-39884-1_33"},{"key":"33_CR14","unstructured":"AWS Instance Types, \n                    \n                      http:\/\/aws.amazon.com\/ec2\/#instance"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., Joglekar, A.: An Integrated Experimental Environment for Distributed Systems and Networks. In: Proc. 5th OSDI, Boston, MA, pp. 255\u2013270 (December 2002)","DOI":"10.1145\/1060289.1060313"},{"key":"33_CR16","unstructured":"Emulab d710 Node Type Information, \n                    \n                      https:\/\/www.emulab.net\/shownodetype.php3?node_type=d710"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Yoshida, R., Cui, Y., Shigetomi, R., Imai, H.: The practicality of the keyword search using PIR. In: ISITA 2008, pp. 1\u20136 (December 2008)","DOI":"10.1109\/ISITA.2008.4895559"},{"key":"33_CR18","unstructured":"Sassaman, L., Preneel, B., Esat-cosic, K.U.L.: The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym Servers. Technical report, ESAT-COSIC 2007-001 (2007)"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Melchor, C., Crespin, B., Gaborit, P., Jolivet, V., Rousseau, P.: High-Speed Private Information Retrieval Computation on GPU. In: SECURWARE 2008, pp. 263\u2013272 (August 2008)","DOI":"10.1109\/SECURWARE.2008.55"},{"key":"33_CR20","unstructured":"Compare of Intel E5506 to E5345, \n                    \n                      http:\/\/ark.intel.com\/Compare.aspx?ids=37096,28032"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Khoshgozaran, A., Shirani-Mehr, H., Shahabi, C.: SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy. In: MDMW 2008 (2008)","DOI":"10.1109\/MDMW.2008.23"},{"key":"33_CR22","first-page":"139","volume-title":"CCS 2008","author":"P. Williams","year":"2008","unstructured":"Williams, P., Sion, R., Carbunar, B.: Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. In: CCS 2008, pp. 139\u2013148. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39884-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T05:49:42Z","timestamp":1557985782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39884-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642398834","9783642398841"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39884-1_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}