{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T07:00:20Z","timestamp":1777964420409,"version":"3.51.4"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T00:00:00Z","timestamp":1616544000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T00:00:00Z","timestamp":1616544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12095-021-00477-z","type":"journal-article","created":{"date-parts":[[2021,3,24]],"date-time":"2021-03-24T20:07:57Z","timestamp":1616616477000},"page":"519-526","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["On the privacy of a code-based single-server computational PIR scheme"],"prefix":"10.1007","volume":"13","author":[{"given":"Sarah","family":"Bordage","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3688-5114","authenticated-orcid":false,"given":"Julien","family":"Lavauzelle","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,24]]},"reference":[{"issue":"2","key":"477_CR1","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1515\/popets-2016-0010","volume":"2016","author":"CA Melchor","year":"2016","unstructured":"Melchor, C.A., Barrier, J., Fousse, L., Killijian, M.-C.: XPIR : Private information retrieval for everyone. PoPETs 2016(2), 155\u2013174 (2016)","journal-title":"PoPETs"},{"key":"477_CR2","doi-asserted-by":"crossref","unstructured":"Chor, B., Gilboa, N.: Computationally private information retrieval. In: Leighton, F.T., Shor, P.W. (eds.) Proceedings of the Twenty-Ninth Annual ACM Symposium on the Theory of Computing, El Paso, Texas, USA, May 4-6, 1997, pp 304\u2013313. ACM (1997)","DOI":"10.1145\/258533.258609"},{"key":"477_CR3","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: 36th Annual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, 23-25 October 1995, pp 41\u201350. IEEE Computer Society (1995)"},{"key":"477_CR4","doi-asserted-by":"crossref","unstructured":"Cachin, C., Micali, S., Stadler, M.: Computationally private information retrieval with polylogarithmic communication. In: Stern, J. (ed.) Advances in Cryptology - EUROCRYPT \u201999, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, volume 1592 of Lecture Notes in Computer Science, pp 402\u2013414. Springer (1999)","DOI":"10.1007\/3-540-48910-X_28"},{"key":"477_CR5","doi-asserted-by":"crossref","unstructured":"Gentry, C., Ramzan, Z.: Single-database private information retrieval with constant communication rate. In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp 803\u2013815 (2005)","DOI":"10.1007\/11523468_65"},{"key":"477_CR6","doi-asserted-by":"crossref","unstructured":"Holzbaur, L., Hollanti, C., Wachter-Zeh, A.: Computational code-based single-server private information retrieval coRR, abs\/2001.07049, 2020 Accepted to ISIT (2020)","DOI":"10.1109\/ISIT44484.2020.9174138"},{"issue":"2","key":"477_CR7","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1515\/popets-2015-0016","volume":"2015","author":"A Kiayias","year":"2015","unstructured":"Kiayias, A., Leonardos, N., Lipmaa, H., Pavlyk, K., Tang, Q.: Optimal rate private information retrieval from homomorphic encryption. PoPETs 2015(2), 222\u2013243 (2015)","journal-title":"PoPETs"},{"key":"477_CR8","unstructured":"Kushilevitz, E., Ostrovsky, R.: Replication is NOT needed: SINGLE database, computationally-private information retrieval. In: 38th Annual Symposium on Foundations of Computer Science, FOCS \u201997, Miami Beach, Florida, USA, October 19-22, 1997, pp 364\u2013373. IEEE Computer Society (1997)"},{"key":"477_CR9","doi-asserted-by":"crossref","unstructured":"Lipmaa, H., Pavlyk, K.: A simpler rate-optimal CPIR protocol. In: Kiayias, A (ed.) Financial Cryptography and Data Security - 21st International Conference, FC 2017, Sliema, Malta, April 3-7, 2017, Revised Selected papers, volume 10322 of Lecture Notes in Computer Science, pp 621\u2013638. Springer (2017)","DOI":"10.1007\/978-3-319-70972-7_35"},{"issue":"5","key":"477_CR10","doi-asserted-by":"publisher","first-page":"1125","DOI":"10.1109\/TKDE.2012.90","volume":"25","author":"X Yi","year":"2013","unstructured":"Yi, X., Kaosar, G, Paulet, R., Bertino, E.: Single-database private information retrieval from fully homomorphic encryption. IEEE Trans. Knowl. Data Eng. 25(5), 1125\u20131134 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00477-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00477-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00477-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,22]],"date-time":"2022-12-22T10:35:55Z","timestamp":1671705355000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00477-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,24]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["477"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00477-z","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"value":"1936-2447","type":"print"},{"value":"1936-2455","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,24]]},"assertion":[{"value":"3 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}