{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:44:21Z","timestamp":1772725461286,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,17]],"date-time":"2011-10-17T00:00:00Z","timestamp":1318809600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,17]]},"DOI":"10.1145\/2046707.2046784","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T13:02:00Z","timestamp":1318942920000},"page":"677-690","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Practical PIR for electronic commerce"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Henry","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Femi","family":"Olumofin","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647086.715699"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"D.\n       \n      Asonov\n    .\n      \n  \n   \n  Querying Databases Privately: A New Approach To Private Information Retrieval volume \n  3128\n   of \n  LNCS\n  . \n  Springer 2004\n  .   D. Asonov. Querying Databases Privately: A New Approach To Private Information Retrieval volume 3128 of LNCS. Springer 2004.","DOI":"10.1007\/b98671"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/11832072_8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/72981.72995"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704119"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646387.690164"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054130"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756169.1756212"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of EUROCRYPT 1995","author":"Brands S.","year":"1995"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/517876"},{"key":"e_1_3_2_1_12_1","volume-title":"Robert. All-or-Nothing Disclosure of Secrets. In Proceedings of CRYPTO 1986","author":"Brassard G.","year":"1986"},{"key":"e_1_3_2_1_13_1","unstructured":"M. Burkhart. SEPIA: Security through Private Information Aggregation. Version 0.8.2.  M. Burkhart. SEPIA: Security through Private Information Aggregation. Version 0.8.2."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2010.5560086"},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of USENIX Security 2010","author":"Burkhart M.","year":"2010"},{"key":"e_1_3_2_1_16_1","unstructured":"J.\n       \n      Camenisch\n    .\n      \n  \n   \n  Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem\n  . PhD thesis ETH Zurich 1998\n  . Reprint as vol. \n  2\n   of \n  \\textitETH Series in Information Security and Cryptography Hartung-Gorre Verlag Konstanz 1998.  J. Camenisch. Group Signature Schemes and Payment Systems Based on the Discrete Logarithm Problem. PhD thesis ETH Zurich 1998. Reprint as vol. 2 of \\textitETH Series in Information Security and Cryptography Hartung-Gorre Verlag Konstanz 1998."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653679"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14577-3_8"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of PKC 2011","author":"Camenisch J.","year":"2011"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756123.1756135"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/795662.796270"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_28"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/646759.705842"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_15"},{"key":"e_1_3_2_1_26_1","unstructured":"B. Doe. The Kindle in Australia October 2009.  B. Doe. The Kindle in Australia October 2009."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of CRYPTO 1986","author":"Fiat A.","year":"1986"},{"key":"e_1_3_2_1_29_1","unstructured":"Free Software Foundation. The GNU Multiple Precision (GMP) Arithmetic Library. Version 5.0.1.  Free Software Foundation. The GNU Multiple Precision (GMP) Arithmetic Library. Version 5.0.1."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/646975.711408"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/276698.276723"},{"key":"e_1_3_2_1_32_1","unstructured":"I. Goldberg. Percy \/ PIR in C. Version 0.7.1.  I. Goldberg. Percy \/ PIR in C. Version 0.7.1."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.23"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of NSDI 2011","author":"Guha S.","year":"2011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/795664.796393"},{"key":"e_1_3_2_1_36_1","volume-title":"University of Waterloo","author":"Henry R.","year":"2011"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007352.1007396"},{"key":"e_1_3_2_1_38_1","volume-title":"CT-RSA","author":"Juels A.","year":"2001"},{"key":"e_1_3_2_1_39_1","unstructured":"A. Kate. PBCWrapper: C++ Wrapper Classes for the Pairing-Based Cryptography Library. Version 0.8.0.  A. Kate. PBCWrapper: C++ Wrapper Classes for the Pairing-Based Cryptography Library. Version 0.8.0."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_2_1_41_1","volume-title":"University of Waterloo","author":"Kate A.","year":"2010"},{"key":"e_1_3_2_1_42_1","volume-title":"Computationally-Private Information Retrieval. In Proceedings of FOCS 1997","author":"Kushilevitz E.","year":"1997"},{"key":"e_1_3_2_1_43_1","unstructured":"B. Lynn. PBC Library: The Pairing-Based Cryptography Library. Version 0.5.11.  B. Lynn. PBC Library: The Pairing-Based Cryptography Library. Version 0.5.11."},{"key":"e_1_3_2_1_44_1","article-title":"Amazon Fights Demand for Customer Records","author":"McCullagh D.","year":"2010","journal-title":"CNET News."},{"key":"e_1_3_2_1_45_1","volume-title":"CRC Press","author":"Menezes A. J.","year":"2001"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietfec\/e90-a.5.960"},{"key":"e_1_3_2_1_47_1","volume-title":"University of Waterloo","author":"Olumofin F.","year":"2010"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881151.1881156"},{"key":"e_1_3_2_1_49_1","unstructured":"Ookla Net Metrics. Canada and US Source Data. http:\/\/www.netindex.com\/source-data\/.  Ookla Net Metrics. Canada and US Source Data. http:\/\/www.netindex.com\/source-data\/."},{"key":"e_1_3_2_1_50_1","unstructured":"OpenSSL Project. OpenSSL: The Open Source toolkit for SSL\/TLS. Version 1.0.0.  OpenSSL Project. OpenSSL: The Open Source toolkit for SSL\/TLS. Version 1.0.0."},{"key":"e_1_3_2_1_51_1","volume-title":"Skeith III. A Survey of Single-Database Private Information Retrieval: Techniques and Applications. In Proceedings of PKC 2007","author":"Ostrovsky R.","year":"2007"},{"key":"e_1_3_2_1_52_1","volume-title":"Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In Proceedings of CRYPTO 1991","author":"Pedersen T. P.","year":"1991"},{"key":"e_1_3_2_1_53_1","volume-title":"Efficient Identification and Signatures for Smart Cards. In Proceedings of CRYPTO 1989","author":"Schnorr C.-P.","year":"1989"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_55_1","unstructured":"V. Shoup. NTL: A Library for doing Number Theory. Version 5.5.2.  V. Shoup. NTL: A Library for doing Number Theory. Version 5.5.2."},{"key":"e_1_3_2_1_56_1","volume-title":"Proceedings of NDSS 2010","author":"Toubiana V.","year":"2010"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/1948966.1948977"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","location":"Chicago Illinois USA","acronym":"CCS'11","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 18th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046707.2046784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:42Z","timestamp":1750240122000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046707.2046784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,17]]},"references-count":56,"alternative-id":["10.1145\/2046707.2046784","10.1145\/2046707"],"URL":"https:\/\/doi.org\/10.1145\/2046707.2046784","relation":{},"subject":[],"published":{"date-parts":[[2011,10,17]]},"assertion":[{"value":"2011-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}