C. Brassard, J. Crépeau, and . Robert, All-or-Nothing Disclosure of Secrets, CRYPTO, ser, pp.234-238, 1986.
DOI : 10.1007/3-540-47721-7_17

J. Kilian, Founding Cryptography on Oblivious Transfer, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp.2-4, 1988.

J. P. Stern, A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol, ASIACRYPT, ser, pp.357-371, 1998.
DOI : 10.1007/3-540-49649-1_28

E. Mann, Private Access to Distributed Information, 2004.

C. Cachin, S. Micali, and M. Stadler, Computationally Private Information Retrieval with Polylogarithmic Communication, Advances in Cryptology: Proceedings of EUROCRYPT, pp.402-414, 1999.
DOI : 10.1007/3-540-48910-X_28

Y. Chang, Single Database Private Information Retrieval with Logarithmic Communication, ACISP: Information Security and Privacy: Australasian Conference, pp.50-61, 2004.
DOI : 10.1007/978-3-540-27800-9_5

H. Lipmaa, An Oblivious Transfer Protocol with Log-Squared Communication, ISC, ser, pp.314-328, 2005.
DOI : 10.1007/11556992_23

C. Gentry and Z. Ramzan, Single-Database Private Information Retrieval with Constant Communication Rate, ICALP: Annual International Colloquium on Automata, Languages and Programming, pp.803-815, 2005.
DOI : 10.1007/11523468_65

C. , A. Melchor, and Y. Deswarte, From DC-nets to pMIXes: multiple variants for anonymous communications, Fifth IEEE International Symposium on Network Computing and Applications, pp.163-172, 2006.

R. Ostrovsky, W. E. Skeith, and I. , Private Searching on Streaming Data, CRYPTO, ser, pp.223-240, 2005.
DOI : 10.1007/11535218_14

S. W. Smith and D. Safford, Practical server privacy with secure coprocessors, IBM Systems Journal, vol.40, issue.3, pp.683-695, 2001.
DOI : 10.1147/sj.403.0683

D. Asonov and J. C. Freytag, Almost Optimal Private Information Retrieval, Lecture Notes in Computer Science, vol.2482, pp.209-223, 2002.
DOI : 10.1007/3-540-36467-6_16

C. Aguilar-melchor and P. Gaborit, A Lattice-Based Computationally- Efficient PIR Protocol Under submission, 2006.

J. Hoffstein, J. Pipher, and J. H. Silverman, NTRU: A ring-based public key cryptosystem, 3rd International Algorithmic Number Theory Symposium (ANTS), pp.267-288, 1998.
DOI : 10.1007/BFb0054868

W. Gasarch, A Survey on Private Information Retrieval, Bulletin of the European Association for Theoretical Computer Science, vol.82, pp.72-107, 2004.

E. Kushilevitz and R. Ostrovsky, Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval (extended abstract), IEEE Symposium on Foundations of Computer Science (FOCS), pp.364-373, 1997.

I. Damgård and M. Jurik, A Length-Flexible Threshold Cryptosystem with Applications, pp.350-364, 2003.

D. Asonov, Querying Databases Privately: A New Approach to Private Information Retrieval, ser. Lecture Notes in Computer Science, 2004.
DOI : 10.1007/b98671

". J. Nielsen, Nielsen Law of internet bandwidth, 1998.

R. Sion and B. Carbunar, On the Computational Practicality of Private Information Retrieval, 14th Network and Distributed Systems Security Simposium, 2007.