{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:07:46Z","timestamp":1763968066165,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,3]],"date-time":"2012-09-03T00:00:00Z","timestamp":1346630400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,3]]},"DOI":"10.1145\/2381716.2381741","type":"proceedings-article","created":{"date-parts":[[2012,10,11]],"date-time":"2012-10-11T15:35:23Z","timestamp":1349969723000},"page":"128-132","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Optimized private information retrieval using graphics processing unit with reduced accessibility"],"prefix":"10.1145","author":[{"given":"Sunil B.","family":"Mane","sequence":"first","affiliation":[{"name":"College of Engineering, Pune M. S., India"}]},{"given":"Sandip B.","family":"Bansode","sequence":"additional","affiliation":[{"name":"College of Engineering, Pune, M. S., India"}]},{"given":"Pradeep K.","family":"Sinha","sequence":"additional","affiliation":[{"name":"Center for Development and Advance Computing, Pune M. S., India"}]}],"member":"320","published-online":{"date-parts":[[2012,9,3]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"41","volume-title":"Proceedings., 36th Annual Symposium on, oct","author":"Chor B.","year":"1995","unstructured":"B. Chor , O. Goldreich , E. Kushilevitz , and M. Sudan , \" Private information retrieval,\" in Foundations of Computer Science, 1995 . Proceedings., 36th Annual Symposium on, oct 1995 , pp. 41 -- 50 . B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan, \"Private information retrieval,\" in Foundations of Computer Science, 1995. Proceedings., 36th Annual Symposium on, oct 1995, pp. 41--50."},{"key":"e_1_3_2_1_2_1","unstructured":"C. Aguilar-melchor \"A lattice-based computationally-efficient private information retrieval protocol.\"  C. Aguilar-melchor \"A lattice-based computationally-efficient private information retrieval protocol.\""},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0035-9"},{"key":"e_1_3_2_1_4_1","first-page":"364","volume-title":"Proceedings., 38th Annual Symposium on, oct","author":"Kushilevitz E.","year":"1997","unstructured":"E. Kushilevitz and R. Ostrovsky , \" Replication is not needed: single database, computationally-private information retrieval,\" in Foundations of Computer Science, 1997 . Proceedings., 38th Annual Symposium on, oct 1997 , pp. 364 -- 373 . E. Kushilevitz and R. Ostrovsky, \"Replication is not needed: single database, computationally-private information retrieval,\" in Foundations of Computer Science, 1997. Proceedings., 38th Annual Symposium on, oct 1997, pp. 364--373."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258609"},{"key":"e_1_3_2_1_6_1","first-page":"357","article-title":"A new and efficient all-or-nothing disclosure of secrets protocol","author":"Stern J. P.","year":"1998","unstructured":"J. P. Stern , U. C. Group , B. Maxwell , and P. D. Levant , \" A new and efficient all-or-nothing disclosure of secrets protocol .\" Springer-Verlag , 1998 , pp. 357 -- 371 . J. P. Stern, U. C. Group, B. Maxwell, and P. D. Levant, \"A new and efficient all-or-nothing disclosure of secrets protocol.\" Springer-Verlag, 1998, pp. 357--371.","journal-title":"Springer-Verlag"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1007\/3-540-48910-X_28","volume-title":"Computationally private information retrieval with polylogarithmic communication,\" in Advances in Cryptology EUROCRYPT 99","author":"Cachin C.","year":"1999","unstructured":"C. Cachin , S. Micali , and M. Stadler , \" Computationally private information retrieval with polylogarithmic communication,\" in Advances in Cryptology EUROCRYPT 99 , ser. Lecture Notes in Computer Science , J. Stern, Ed. Springer Berlin\/Heidelberg , 1999 , vol. 1592 , pp. 402 -- 414 , 10.1007\/3-540-48910-X 28. {Online}. Available: http:\/\/dx.doi.org\/10.1007\/3-540-48910-X 28 10.1007\/3-540-48910-X C. Cachin, S. Micali, and M. Stadler, \"Computationally private information retrieval with polylogarithmic communication,\" in Advances in Cryptology EUROCRYPT 99, ser. Lecture Notes in Computer Science, J. Stern, Ed. Springer Berlin\/Heidelberg, 1999, vol. 1592, pp. 402--414, 10.1007\/3-540-48910-X 28. {Online}. Available: http:\/\/dx.doi.org\/10.1007\/3-540-48910-X 28"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_65"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"H. Lipmaa \"An oblivious transfer protocol with log-squared communication \" 2004.  H. Lipmaa \"An oblivious transfer protocol with log-squared communication \" 2004.","DOI":"10.1007\/11556992_23"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595308"},{"key":"e_1_3_2_1_12_1","unstructured":"C. A. Melchor \"High-speed single-database pir implementation.\"  C. A. Melchor \"High-speed single-database pir implementation.\""},{"volume-title":"Usability and Trends,\" Rapport de recherche","year":"2007","key":"e_1_3_2_1_13_1","unstructured":"\"Single-Database Private Information Retrieval Protocols:Overview , Usability and Trends,\" Rapport de recherche , 2007 . {Online}. Available: http:\/\/hal.inria.fr\/inria-00134415 \"Single-Database Private Information Retrieval Protocols:Overview, Usability and Trends,\" Rapport de recherche, 2007. {Online}. Available: http:\/\/hal.inria.fr\/inria-00134415"},{"key":"e_1_3_2_1_14_1","first-page":"84","volume-title":"A performance comparison of data encryption algorithms,\" 2005 International Conference on Information and Communication Technologies","author":"Nadeem A.","year":"2005","unstructured":"A. Nadeem and M. Y. Javed , \" A performance comparison of data encryption algorithms,\" 2005 International Conference on Information and Communication Technologies , pp. 84 -- 89 , 2005 . {Online}. Available: http:\/\/ieeexplore.ieee.org\/lpdocs A. Nadeem and M. Y. Javed, \"A performance comparison of data encryption algorithms,\" 2005 International Conference on Information and Communication Technologies, pp. 84--89, 2005. {Online}. Available: http:\/\/ieeexplore.ieee.org\/lpdocs"},{"key":"e_1_3_2_1_15_1","volume-title":"GPU Computing Gems Emerald Edition","author":"W.","year":"2011","unstructured":"W. mei W. Hwu , GPU Computing Gems Emerald Edition , 1 st ed.San Francisco, CA, USA : Morgan Kaufmann Publishers Inc ., 2011 . W. mei W. Hwu, GPU Computing Gems Emerald Edition, 1st ed.San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2011.","edition":"1"},{"issue":"2","key":"e_1_3_2_1_16_1","first-page":"238","article-title":"High performance computing at nasa","volume":"1","author":"Bailey D. H.","year":"1994","unstructured":"D. H. Bailey , \" High performance computing at nasa ,\" Performance Computing , vol. 1 , no. 2 , pp. 238 -- 241 , 1994 .{Online}. Available: http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5455096 D. H. Bailey, \"High performance computing at nasa,\" Performance Computing, vol. 1, no. 2, pp. 238--241, 1994.{Online}. Available: http:\/\/ieeexplore.ieee.org\/lpdocs\/epic03\/wrapper.htm?arnumber=5455096","journal-title":"Performance Computing"},{"key":"e_1_3_2_1_17_1","volume-title":"NVIDIA CUDA Compute Unified Device Architecture Programming Guide http:\/\/developer.download 1.1..nvidia.com\/compute\/cuda\/11\/NVIDIA CUDA Programming Guide 1.1.pdf","author":"N. Corp.","year":"2007","unstructured":"N. Corp. NVIDIA CUDA Compute Unified Device Architecture Programming Guide http:\/\/developer.download 1.1..nvidia.com\/compute\/cuda\/11\/NVIDIA CUDA Programming Guide 1.1.pdf , 2007 N. Corp. NVIDIA CUDA Compute Unified Device Architecture Programming Guide http:\/\/developer.download 1.1..nvidia.com\/compute\/cuda\/11\/NVIDIA CUDA Programming Guide 1.1.pdf, 2007"}],"event":{"name":"CUBE '12: CUBE International IT Conference & Exhibition","sponsor":["CUOT Curtin University of Technology"],"location":"Pune India","acronym":"CUBE '12"},"container-title":["Proceedings of the CUBE International Information Technology Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2381716.2381741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:18:22Z","timestamp":1750234702000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2381716.2381741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,3]]},"references-count":16,"alternative-id":["10.1145\/2381716.2381741","10.1145\/2381716"],"URL":"https:\/\/doi.org\/10.1145\/2381716.2381741","relation":{},"subject":[],"published":{"date-parts":[[2012,9,3]]},"assertion":[{"value":"2012-09-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}