Abstract
Private information retrieval (PIR) protocols allow a user to retrieve an item from a database stored on a server without revealing what the item is. In more detail, imagine a server that has a database D in clear and a client that wants to download the i-th item from D. The client can encrypt i in some way, generating a ciphertext c, which is then sent to the server. The server then uses…