{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T07:14:55Z","timestamp":1770448495245,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662478530","type":"print"},{"value":"9783662478547","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-47854-7_10","type":"book-chapter","created":{"date-parts":[[2015,7,15]],"date-time":"2015-07-15T10:06:28Z","timestamp":1436954788000},"page":"168-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":37,"title":["Sublinear Scaling for Multi-Client Private Information Retrieval"],"prefix":"10.1007","author":[{"given":"Wouter","family":"Lueks","sequence":"first","affiliation":[]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Aguilar Melchor, C., Gaborit, P.: A lattice-based computationally-efficient private information retrieval protocol. In: Western European Workshop on Research in Cryptology (2007)","DOI":"10.1109\/ISIT.2008.4595308"},{"issue":"3","key":"10_CR2","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s00145-007-0424-2","volume":"20","author":"A Beimel","year":"2007","unstructured":"Beimel, A., Stahl, Y.: Robust information-theoretic private information retrieval. J. Cryptology 20(3), 295\u2013321 (2007)","journal-title":"J. Cryptology"},{"key":"10_CR3","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: 36th Annual IEEE Symposium on Foundations of Computer Science, pp. 41\u201350 (1995)"},{"key":"10_CR4","unstructured":"Chor, B., Gilboa, N., Naor, M.: Private Information Retrieval by Keywords. Technical report TR CS0917, Department of Computer Science, Technion, Israel (1997)"},{"issue":"3","key":"10_CR5","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/S0747-7171(08)80013-2","volume":"9","author":"D Coppersmith","year":"1990","unstructured":"Coppersmith, D., Winograd, S.: Matrix multiplication via arithmetic progressions. J. Symbolic Comput. 9(3), 251\u2013280 (1990)","journal-title":"J. Symbolic Comput."},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-319-08506-7_4","volume-title":"Privacy Enhancing Technologies","author":"C Devet","year":"2014","unstructured":"Devet, C., Goldberg, I.: The best of both worlds: combining information-theoretic and computational PIR for communication efficiency. In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 63\u201382. Springer, Heidelberg (2014)"},{"key":"10_CR7","unstructured":"Devet, C., Goldberg, I., Heninger, N.: Optimally robust private information retrieval. In: 21st USENIX Security Symposium (2012)"},{"key":"10_CR8","unstructured":"Fox-IT BV: Black Tulip: Report of the investigation into the DigiNotar Certificate Authority breach, August 2012"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Goldberg, I.: Improving the robustness of private information retrieval. In: 28th IEEE Symposium on Security and Privacy, pp. 131\u2013148 (2007)","DOI":"10.1109\/SP.2007.23"},{"key":"10_CR10","unstructured":"Goldberg, I., Devet, C., Hendry, P., Henry, R.: Percy++ project on SourceForge, version 0.9.0 (2013). http:\/\/percy.sourceforge.net. Accessed September 2014"},{"key":"10_CR11","unstructured":"Goldberg, I., Devet, C., Lueks, W., Yang, A., Hendry, P., Henry, R.: Percy++ project on SourceForge, version 1.0 (2014). http:\/\/percy.sourceforge.net\/. Accessed November 2014"},{"key":"10_CR12","unstructured":"Henry, R., Huang, Y., Goldberg, I.: One (block) size fits all: PIR and SPIR with variable-length records via multi-block queries. In: 20th Annual Network and Distributed System Security Symposium (2013)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Ishai, Y., Kushilevitz, E., Ostrovsky, R., Sahai, A.: Batch codes and their applications. In: 36th ACM Symposium on Theory of Computing, pp. 262\u2013271 (2004)","DOI":"10.1145\/1007352.1007396"},{"key":"10_CR14","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally-private information retrieval. In: 38th Annual IEEE Symposium on Foundations of Computer Science, pp. 364\u2013373 (1997)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate Transparency. RFC 6962 (Experimental), June 2013. http:\/\/www.ietf.org\/rfc\/rfc6962.txt","DOI":"10.17487\/rfc6962"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-642-14527-8_5","volume-title":"Privacy Enhancing Technologies","author":"F Olumofin","year":"2010","unstructured":"Olumofin, F., Goldberg, I.: Privacy-preserving queries over relational databases. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 75\u201392. Springer, Heidelberg (2010)"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/978-3-642-27576-0_13","volume-title":"Financial Cryptography and Data Security","author":"Femi Olumofin","year":"2012","unstructured":"Olumofin, Femi, Goldberg, Ian: Revisiting the Computational Practicality of Private Information Retrieval. In: Danezis, George (ed.) FC 2011. LNCS, vol. 7035, pp. 158\u2013172. Springer, Heidelberg (2012)"},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-14527-8_6","volume-title":"Privacy Enhancing Technologies","author":"F Olumofin","year":"2010","unstructured":"Olumofin, F., Tysowski, P.K., Goldberg, I., Hengartner, U.: Achieving efficient query privacy for location based services. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 93\u2013110. Springer, Heidelberg (2010)"},{"issue":"11","key":"10_CR19","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"10_CR20","unstructured":"Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: 14th Network and Distributed Systems Security Symposium (2007)"},{"issue":"4","key":"10_CR21","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/BF02165411","volume":"13","author":"V Strassen","year":"1969","unstructured":"Strassen, V.: Gaussian elimination is not optimal. Numer. Math. 13(4), 354\u2013356 (1969)","journal-title":"Numer. Math."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-47854-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T20:13:53Z","timestamp":1674245633000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-47854-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662478530","9783662478547"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-47854-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}