{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T21:31:24Z","timestamp":1765229484436,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","funder":[{"name":"Swiss National Science Foundation (SNSF)","award":["215216"],"award-info":[{"award-number":["215216"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,15]]},"DOI":"10.1145\/3721462.3770764","type":"proceedings-article","created":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T19:56:49Z","timestamp":1765223809000},"page":"16-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["IM-PIR: In-Memory Private Information Retrieval"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-7980-3968","authenticated-orcid":false,"given":"Mpoki","family":"Mwaisela","sequence":"first","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3371-9228","authenticated-orcid":false,"given":"Peterson","family":"Yuhala","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1574-6721","authenticated-orcid":false,"given":"Pascal","family":"Felber","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1493-6603","authenticated-orcid":false,"given":"Valerio","family":"Schiavoni","sequence":"additional","affiliation":[{"name":"University of Neuch\u00e2tel, Neuch\u00e2tel, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2025,12,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9791"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0010"},{"key":"e_1_3_2_1_3_1","volume-title":"15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21)","author":"Ahmad Ishtiyaque","year":"2021","unstructured":"Ishtiyaque Ahmad, Yuntian Yang, Divyakant Agrawal, Amr El Abbadi, and Trinabh Gupta. 2021. Addra: Metadata-private voice communication over fully untrusted infrastructure. In 15th USENIX Symposium on Operating Systems Design and Implementation (OSDI 21). USENIX Association, 313\u2013329. https:\/\/www.usenix.org\/conference\/osdi21\/presentation\/ahmad"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749469.2750386"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2020.3013728"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00062"},{"key":"e_1_3_2_1_7_1","volume-title":"Querying Databases Privately: A New Approach to Private Information Retrieval","author":"Asonov D.","unstructured":"D. Asonov. 2004. Querying Databases Privately: A New Approach to Private Information Retrieval. Springer. https:\/\/books.google.ch\/books?id=9mvp2mhPN0QC"},{"key":"e_1_3_2_1_8_1","volume-title":"Accelerating Triangle Counting with Real Processing-in-Memory Systems. arXiv preprint arXiv:2505.04269","author":"Asquini Lorenzo","year":"2025","unstructured":"Lorenzo Asquini, Manos Frouzakis, Juan G\u00e1mez-Luna, Mohammad Sadrosadati, Onur Mutlu, and Francesco Silvestri. 2025. Accelerating Triangle Counting with Real Processing-in-Memory Systems. arXiv preprint arXiv:2505.04269 (2025)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.18420\/BTW2023-51"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173177"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978429"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_3_2_1_15_1","volume-title":"Advances in Cryptology\u2014EUROCRYPT'99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136","author":"Cachin Christian","year":"1999","unstructured":"Christian Cachin, Silvio Micali, and Markus Stadler. 1999. Computationally private information retrieval with polylogarithmic communication. In Advances in Cryptology\u2014EUROCRYPT'99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136, 1999 Proceedings 18. Springer, 402\u2013414."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3654964"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation","author":"Corrigan-Gibbs Henry","year":"2017","unstructured":"Henry Corrigan-Gibbs and Dan Boneh. 2017. Prio: private, robust, and scalable computation of aggregate statistics. In Proceedings of the 14th USENIX Conference on Networked Systems Design and Implementation (Boston, MA, USA) (NSDI'17). USENIX Association, USA, 259\u2013282."},{"key":"e_1_3_2_1_19_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 160\u2013171","author":"Dai Wei","year":"2015","unstructured":"Wei Dai, Yark\u0131n Dor\u00f6z, and Berk Sunar. 2015. Accelerating swhe based pirs using gpus. In International Conference on Financial Cryptography and Data Security. Springer, 160\u2013171."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664181"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTCHIPS.2019.8875680"},{"key":"e_1_3_2_1_22_1","volume-title":"Onur Mutlu, and Izzat El Hajj.","author":"Diab Safaa","year":"2023","unstructured":"Safaa Diab, Amir Nassereldine, Mohammed Alser, Juan G\u00e1mez Luna, Onur Mutlu, and Izzat El Hajj. 2023. A framework for high-throughput sequence alignment using real processing-in-memory systems. Bioinformatics 39, 5 (2023), btad155."},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 195\u2013207","author":"Dor\u00f6z Yark\u0131n","year":"2014","unstructured":"Yark\u0131n Dor\u00f6z, Berk Sunar, and Ghaith Hammouri. 2014. Bandwidth efficient PIR from NTRU. In International Conference on Financial Cryptography and Data Security. Springer, 195\u2013207."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514197"},{"key":"e_1_3_2_1_25_1","unstructured":"Samsung Electronics. 2021. Open Innovation Contest for AXDIMM Technology. (2021). https:\/\/semiconductor.samsung.com\/emea\/news-events\/events\/open-innovation-contest\/ Accessed: 2025-02-25."},{"key":"e_1_3_2_1_26_1","unstructured":"Samsung Electronics. 2021. Samsung Develops Industry's First High Bandwidth Memory with AI Processing Power. (2021). https:\/\/news.samsung.com\/global\/samsung-develops-industrys-first-high-bandwidth-memory-with-ai-processing-power Accessed: 2025-02-25."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CICC.1992.591879"},{"key":"e_1_3_2_1_28_1","volume-title":"Ethereum Blockchain Explorer. https:\/\/etherscan.io\/ Accessed","year":"2025","unstructured":"Etherscan. 2024. Ethereum Blockchain Explorer. https:\/\/etherscan.io\/ Accessed: Feb 24, 2025."},{"key":"e_1_3_2_1_29_1","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive Paper 2012\/144. https:\/\/eprint.iacr.org\/2012\/144 https:\/\/eprint.iacr.org\/2012\/144."},{"key":"e_1_3_2_1_30_1","volume-title":"Password Storage Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Password_Storage_Cheat_Sheet.html Accessed","author":"Foundation OWASP","year":"2025","unstructured":"OWASP Foundation. 2024. Password Storage Cheat Sheet. https:\/\/cheatsheetseries.owasp.org\/cheatsheets\/Password_Storage_Cheat_Sheet.html Accessed: Feb 24, 2025."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3609308.3625266"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11523468_65"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3508041"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3700434"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS61541.2024.00029"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.375174"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/6490.6503"},{"key":"e_1_3_2_1_40_1","volume-title":"https:\/\/certificate.transparency.dev\/ Accessed","author":"Transparency Certificate","year":"2025","unstructured":"Google. 2024. Certificate Transparency. https:\/\/certificate.transparency.dev\/ Accessed: Feb 24, 2025."},{"key":"e_1_3_2_1_41_1","volume-title":"An Implementation of Incremental Distributed Point Functions in C++. https:\/\/github.com\/google\/distributed_point_functions Accessed","author":"Research Google","year":"2025","unstructured":"Google Research. 2025. An Implementation of Incremental Distributed Point Functions in C++. https:\/\/github.com\/google\/distributed_point_functions Accessed: June 3, 2025."},{"key":"e_1_3_2_1_42_1","volume-title":"Intel advanced encryption standard (AES) new instructions set","author":"Gueron Shay","year":"2010","unstructured":"Shay Gueron. 2010. Intel advanced encryption standard (AES) new instructions set. Intel Corporation 128 (2010)."},{"key":"e_1_3_2_1_43_1","volume-title":"GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. In 31st USENIX Security Symposium (USENIX Security 22)","author":"G\u00fcnther Daniel","year":"2022","unstructured":"Daniel G\u00fcnther, Maurice Heymann, Benny Pinkas, and Thomas Schneider. 2022. GPU-accelerated PIR with Client-Independent Preprocessing for Large-Scale Applications. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 1759\u20131776. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/gunther"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3563497"},{"key":"e_1_3_2_1_45_1","volume-title":"Scalable and Private Media Consumption with Popcorn. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)","author":"Gupta Trinabh","year":"2016","unstructured":"Trinabh Gupta, Natacha Crooks, Whitney Mulhern, Srinath Setty, Lorenzo Alvisi, and Michael Walfish. 2016. Scalable and Private Media Consumption with Popcorn. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16). USENIX Association, Santa Clara, CA, 91\u2013107. https:\/\/www.usenix.org\/conference\/nsdi16\/technical-sessions\/presentation\/gupta-trinabh"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174101"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3174101"},{"key":"e_1_3_2_1_48_1","unstructured":"Mark Harris et al. 2007. Optimizing parallel reduction in CUDA. Nvidia developer technology 2 4 (2007) 70."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.46"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783764"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 32nd USENIX Conference on Security Symposium","author":"Henzinger Alexandra","year":"2023","unstructured":"Alexandra Henzinger, Matthew M. Hong, Henry Corrigan-Gibbs, Sarah Meikle-john, and Vinod Vaikuntanathan. 2023. One server for the price of two: simple and fast single-server private information retrieval. In Proceedings of the 32nd USENIX Conference on Security Symposium (Anaheim, CA, USA) (SEC '23). USENIX Association, USA, Article 218, 17 pages."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS47924.2020.00076"},{"key":"e_1_3_2_1_53_1","volume-title":"Have I Been Pwned - Breach Database. https:\/\/haveibeenpwned.com\/ Accessed","author":"Hunt Troy","year":"2025","unstructured":"Troy Hunt. 2024. Have I Been Pwned - Breach Database. https:\/\/haveibeenpwned.com\/ Accessed: Feb 24, 2025."},{"key":"e_1_3_2_1_54_1","volume-title":"Accelerating DNA Read Mapping with Digital Processing-in-Memory. ArXiv abs\/2411.03832","author":"Hur Rotem Ben","year":"2024","unstructured":"Rotem Ben Hur, Orian Leitersdorf, Ronny Ronen, Lidor Goldshmidt, Idan Magram, Lior Kaplun, Leonid Yavitz, and Shahar Kvatinsky. 2024. Accelerating DNA Read Mapping with Digital Processing-in-Memory. ArXiv abs\/2411.03832 (2024). https:\/\/api.semanticscholar.org\/CorpusID:273850423"},{"key":"e_1_3_2_1_55_1","unstructured":"SK Hynix. 2021. SK Hynix Develops World's First GDDR6-PIM (Processing In Memory) DRAM. (2021). https:\/\/news.skhynix.com\/sk-hynix-develops-worlds-first-gddr6-pim-processing-in-memory-dram\/ Accessed: 2025-02-25."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA57654.2024.00029"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639046"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00039"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.14778\/3574245.3574275"},{"key":"e_1_3_2_1_60_1","volume-title":"Private Blocklist Lookups with Checklist. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Kogan Dmitry","year":"2021","unstructured":"Dmitry Kogan and Henry Corrigan-Gibbs. 2021. Private Blocklist Lookups with Checklist. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 875\u2013892. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/kogan"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1997.646125"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3617232.3624855"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM.2016.7822732"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO61859.2024.00053"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3698827"},{"key":"e_1_3_2_1_66_1","unstructured":"Zhichuang Liang and Yunlei Zhao. 2022. Number Theoretic Transform and Its Applications in Lattice-based Cryptosystems: A Survey. arXiv:2211.13546 [cs.CR]"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589258"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3527433"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASAP.2015.7245719"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.55"},{"key":"e_1_3_2_1_72_1","volume-title":"Proceedings of the 33rd USENIX Conference on Security Symposium","author":"Menon Samir Jordan","unstructured":"Samir Jordan Menon and David J. Wu. 2024. YPIR: high-throughput single-server PIR with silent preprocessing. In Proceedings of the 33rd USENIX Conference on Security Symposium (Philadelphia, PA, USA) (SEC '24). USENIX Association, USA, Article 335, 18 pages."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485381"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2018.8405955"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS64841.2024.00019"},{"key":"e_1_3_2_1_76_1","volume-title":"Processing in Storage Class Memory. In 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 20)","author":"Nider Joel","year":"2020","unstructured":"Joel Nider, Craig Mustard, Andrada Zoltan, and Alexandra Fedorova. 2020. Processing in Storage Class Memory. In 12th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage 20). USENIX Association. https:\/\/www.usenix.org\/conference\/hotstorage20\/presentation\/nider"},{"key":"e_1_3_2_1_77_1","volume-title":"NIST Special Publication 800\u201363B - Digital Identity Guidelines: Authentication and Lifecycle Management. https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html Accessed","author":"National Institute of Standards and Technology (NIST). 2024.","year":"2025","unstructured":"National Institute of Standards and Technology (NIST). 2024. NIST Special Publication 800\u201363B - Digital Identity Guidelines: Authentication and Lifecycle Management. https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html Accessed: Feb 24, 2025."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.592312"},{"key":"e_1_3_2_1_79_1","volume-title":"Certificate Transparency Logs. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/net\/docs\/certificate-transparency.md Accessed","author":"Project Chromium","year":"2025","unstructured":"Chromium Project. 2024. Certificate Transparency Logs. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/master\/net\/docs\/certificate-transparency.md Accessed: Feb 24, 2025."},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3656019.3676947"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3294446"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCA.2015.2434872"},{"key":"e_1_3_2_1_83_1","volume-title":"https:\/\/www.upmem.com\/ Accessed","author":"UPMEM.","year":"2025","unstructured":"UPMEM. 2025. UPMEM. https:\/\/www.upmem.com\/ Accessed: February 17, 2025."},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18072.2020.9218660"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/216585.216588"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600212.2600213"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC.2013.6670336"}],"event":{"name":"MIDDLEWARE '25: 26th International Middleware Conference","location":"Vanderbilt University Nashville TN USA","acronym":"MIDDLEWARE '25","sponsor":["IFIP","Usenix"]},"container-title":["Proceedings of the 26th International Middleware Conference"],"original-title":[],"deposited":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T19:57:28Z","timestamp":1765223848000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721462.3770764"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,14]]},"references-count":87,"alternative-id":["10.1145\/3721462.3770764","10.1145\/3721462"],"URL":"https:\/\/doi.org\/10.1145\/3721462.3770764","relation":{},"subject":[],"published":{"date-parts":[[2025,12,14]]},"assertion":[{"value":"2025-12-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}