"Private Information Retrieval (PIR) ist ein kryptographisches Primitiv, das ein Protokoll modelliert, bei dem eine Anfrage an eine Datenbank gestellt und auch beantwortet werden kann, ohne dass die Datenbank Aussagen \u00FCber den angeforderten Eintrag machen kann. Die Anfragen k\u00F6nnen daher auch nicht miteinander verkn\u00FCpft werden, um die Interessen des Anfragenden zu ermitteln. So wird die Privatheit des Anfragenden unterst\u00FCtzt, auch wenn er \u00F6ffentliche Datenbanken benutzt."@de . . . . "Private Information Retrieval"@de . . . . "\u5728\u5BC6\u78BC\u5B78\uFF0C\u79C1\u6709\u4FE1\u606F\u6AA2\u7D22\uFF08\u82F1\u8A9E\uFF1APrivate information retrieval\uFF0CPIR\uFF09\u5354\u8B70\u4EE4\u7528\u6236\u53EF\u4EE5\u5728\u4E0D\u62AB\u9732\u4E0B\u8F09\u9805\u76EE\u7684\u540C\u6642\uFF0C\u5F9E\u6301\u6709\u6578\u64DA\u5EAB\u7684\u4F3A\u670D\u5668\u4E0B\u8F09\u9805\u76EE\u3002 PIR\u4EA6\u53EF\u8996\u70BA\u4E00\u7A2E\u5F31\u5316\u7684n\u90781\u4E0D\u7D93\u610F\u50B3\u8F38\uFF08OT\uFF09\uFF0C\u4F46\u6709\u5340\u5225\uFF0C\u5728\u65BCOT\u4EA6\u8981\u6C42\u7528\u6237\u4E0D\u5F97\u7372\u5F97\u5176\u4ED6\u6578\u64DA\u9805\u76EE\u7684\u4FE1\u606F\u3002 \u4E00\u7A2E\u5E73\u51E1\u4F46\u6548\u7387\u5947\u4F4E\u7684PIR\u53EF\u4EE5\u901A\u904E\u8B93\u4F3A\u670D\u5668\u8907\u88FD\u6574\u500B\u6578\u64DA\u5EAB\uFF0C\u7136\u5F8C\u50B3\u9001\u7D66\u7528\u6236\u5BE6\u73FE\u3002\u5BE6\u969B\u4E0A\uFF0C\u55AE\u4F3A\u670D\u5668\uFF08\u4E0D\u8AD6\u662F\u7D93\u5178\u6216\u91CF\u5B50\uFF09\u8A2D\u5B9A\u4E0B\uFF0C\u9019\u662F\u552F\u4E00\u80FD\u4FE1\u606F\u5B78\u5B89\u5168\u5730\u4FDD\u8B77\u7528\u6236\u67E5\u8A62\u7684\u65B9\u6848\u3002\u6709\u5169\u7A2E\u65B9\u5F0F\u61C9\u5C0D\u9019\u500B\u554F\u984C\uFF1A\u8981\u9EBC\u5047\u8A2D\u4F3A\u670D\u5668\uFF0C\u8981\u9EBC\u5047\u8A2D\u6709\u82E5\u5E72\u500B\u76F8\u4E92\u4E0D\u4E32\u901A\u7684\u4F3A\u670D\u5668\uFF0C\u800C\u5404\u4F3A\u670D\u5668\u6301\u6709\u4E00\u4EFD\u6578\u64DA\u5EAB\u7684\u5099\u4EFD\u3002 \u8A72\u554F\u984C\u7684\u4FE1\u606F\u8AD6\u7248\u672C\u65BC1995\u5E74\u7531\uFF0C\uFF0C\u548C\u5F15\u5165\uFF0C\u8A08\u7B97\u7248\u672C\u5247\u65BC1997\u5E74\u7531\u548C\u63D0\u51FA\u3002\u4E4B\u5F8C\u53C8\u6709\u7814\u7A76\u8005\u63D0\u51FA\u4E86\u7406\u8AD6\u4E0A\u975E\u5E38\u9AD8\u6548\u7684\u65B9\u6848\u3002\u55AE\u4F3A\u670D\u5668\uFF08\u8A08\u7B97\u5B89\u5168\uFF09PIR\u53EA\u9808\uFF08\u5747\u6524\uFF09\u5E38\u6578\u901A\u4FE1 \uFF0C\u800Ck\u2014\u4F3A\u670D\u5668\uFF08\u4FE1\u606F\u5B78\u5B89\u5168\uFF09PIR\u5247\u53EF\u7528 \u901A\u8A0A\u5B8C\u6210\uFF08\u4F46\u4E0B\u754C\u4ECD\u7136\u662F\u8FD1\u4E4E\u7DDA\u6027\u7684\u91CF\u7D1A\uFF09\u3002"@zh . . . . . . . . . . . "In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-n oblivious transfer, where it is also required that the user should not get information about other database items."@en . "\u041F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u0435 \u0441\u043A\u0440\u044B\u0442\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438"@ru . . . . . . . . . . "1068898272"^^ . . "Na criptografia, um protocolo de recupera\u00E7\u00E3o de informa\u00E7\u00F5es privadas (PIR) \u00E9 um protocolo que permite ao usu\u00E1rio recuperar um item de um servidor na posse de um banco de dados sem revelar qual item \u00E9 recuperado. O PIR \u00E9 uma vers\u00E3o mais fraca da , onde tamb\u00E9m \u00E9 necess\u00E1rio que o usu\u00E1rio n\u00E3o obtenha informa\u00E7\u00F5es sobre outros itens do banco de dados.Uma maneira trivial, mas muito ineficiente de obter o PIR, \u00E9 o servidor enviar uma c\u00F3pia inteira do banco de dados ao usu\u00E1rio. De fato, esse \u00E9 o \u00FAnico protocolo poss\u00EDvel (na configura\u00E7\u00E3o cl\u00E1ssica ou qu\u00E2ntica) que oferece privacidade te\u00F3rica \u00E0s informa\u00E7\u00F5es do usu\u00E1rio para sua consulta em uma configura\u00E7\u00E3o de servidor \u00FAnico. H\u00E1 duas maneiras cl\u00E1ssicas de resolver esse problema: uma \u00E9 tornar o servidor limitado computacionalmente e a outra \u00E9 assumir que existem v\u00E1rios servidores n\u00E3o cooperantes, cada um com uma c\u00F3pia do banco de dados. O problema foi introduzido em 1995 por Chor, Goldreich, Kushilevitz e Sudan [2] no cen\u00E1rio te\u00F3rico da informa\u00E7\u00E3o e em 1997 por Kushilevitz e Ostrovsky no cen\u00E1rio computacional. Desde ent\u00E3o, solu\u00E7\u00F5es muito eficientes foram descobertas. O PIR de banco de dados \u00FAnico (computacionalmente privado) pode ser alcan\u00E7ado com comunica\u00E7\u00E3o constante (amortizada) e o PIR do banco de dados k (informa\u00E7\u00E3o te\u00F3rica) pode ser feito com comunica\u00E7\u00E3o ."@pt . . "17432"^^ . . . "\u79C1\u6709\u4FE1\u606F\u6AA2\u7D22"@zh . . . . . . "Private Information Retrieval (PIR) ist ein kryptographisches Primitiv, das ein Protokoll modelliert, bei dem eine Anfrage an eine Datenbank gestellt und auch beantwortet werden kann, ohne dass die Datenbank Aussagen \u00FCber den angeforderten Eintrag machen kann. Die Anfragen k\u00F6nnen daher auch nicht miteinander verkn\u00FCpft werden, um die Interessen des Anfragenden zu ermitteln. So wird die Privatheit des Anfragenden unterst\u00FCtzt, auch wenn er \u00F6ffentliche Datenbanken benutzt."@de . . . . . . . . . . . . "In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-n oblivious transfer, where it is also required that the user should not get information about other database items. One trivial, but very inefficient way to achieve PIR is for the server to send an entire copy of the database to the user. In fact, this is the only possible protocol (in the classical or the quantum setting) that gives the user information theoretic privacy for their query in a single-server setting. There are two ways to address this problem: make the server or assume that there are multiple non-cooperating servers, each having a copy of the database. The problem was introduced in 1995 by Chor, Goldreich, Kushilevitz and Sudan in the information-theoretic setting and in 1997 by Kushilevitz and Ostrovsky in the computational setting. Since then, very efficient solutions have been discovered. Single database (computationally private) PIR can be achieved with constant (amortized) communication and k-database (information theoretic) PIR can be done with communication."@en . "\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u0641\u064A \u0639\u0644\u0645 \u0627\u0644\u062A\u0639\u0645\u064A\u0629 \u064A\u0633\u0645\u062D \u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0644\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u0628\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0646\u0635 \u0645\u0646 \u062E\u0627\u062F\u0645 \u064A\u0646\u062A\u0645\u064A \u0625\u0644\u064A \u0642\u0627\u0639\u062F\u0629 \u0628\u064A\u0627\u0646\u0627\u062A \u0628\u062F\u0648\u0646 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0627\u0644\u0646\u0635 \u0627\u0644\u0630\u064A \u062A\u062A\u0645 \u0627\u0633\u062A\u0639\u0627\u062F\u062A\u0647. \u064A\u0639\u062A\u0628\u0631 \u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u0646\u0633\u062E\u0629 \u0623\u0636\u0639\u0641 \u0645\u0646 \u0627\u0644\u0646\u0642\u0644 \u0627\u0644\u0648\u0627\u0636\u062D 1-\u0645\u0646- \u0639\u062F\u062F \u0644\u0627\u0646\u0647\u0627\u0626\u064A \u062D\u064A\u062B \u064A\u0643\u0648\u0646 \u0645\u0646 \u0627\u0644\u0636\u0631\u0648\u0631\u064A \u0623\u064A\u0636\u0627\u064B \u0623\u0644\u0627 \u064A\u062D\u0635\u0644 \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u0639\u0644\u064A \u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0639\u0646 \u0646\u0635\u0648\u0635 \u0645\u0646 \u0642\u0648\u0627\u0639\u062F \u0628\u064A\u0627\u0646\u0627\u062A \u0623\u062E\u0631\u0649."@ar . "Private information retrieval"@en . . . . . . "\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u0641\u064A \u0639\u0644\u0645 \u0627\u0644\u062A\u0639\u0645\u064A\u0629 \u064A\u0633\u0645\u062D \u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0644\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u0628\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0646\u0635 \u0645\u0646 \u062E\u0627\u062F\u0645 \u064A\u0646\u062A\u0645\u064A \u0625\u0644\u064A \u0642\u0627\u0639\u062F\u0629 \u0628\u064A\u0627\u0646\u0627\u062A \u0628\u062F\u0648\u0646 \u0627\u0644\u0643\u0634\u0641 \u0639\u0646 \u0627\u0644\u0646\u0635 \u0627\u0644\u0630\u064A \u062A\u062A\u0645 \u0627\u0633\u062A\u0639\u0627\u062F\u062A\u0647. \u064A\u0639\u062A\u0628\u0631 \u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u0646\u0633\u062E\u0629 \u0623\u0636\u0639\u0641 \u0645\u0646 \u0627\u0644\u0646\u0642\u0644 \u0627\u0644\u0648\u0627\u0636\u062D 1-\u0645\u0646- \u0639\u062F\u062F \u0644\u0627\u0646\u0647\u0627\u0626\u064A \u062D\u064A\u062B \u064A\u0643\u0648\u0646 \u0645\u0646 \u0627\u0644\u0636\u0631\u0648\u0631\u064A \u0623\u064A\u0636\u0627\u064B \u0623\u0644\u0627 \u064A\u062D\u0635\u0644 \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u0639\u0644\u064A \u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0639\u0646 \u0646\u0635\u0648\u0635 \u0645\u0646 \u0642\u0648\u0627\u0639\u062F \u0628\u064A\u0627\u0646\u0627\u062A \u0623\u062E\u0631\u0649. \u0645\u0646 \u0625\u062D\u062F\u064A \u0627\u0644\u0637\u0631\u0642 \u0627\u0644\u0636\u0639\u064A\u0641\u0629 \u0648\u0627\u0644\u063A\u064A\u0631 \u0641\u0639\u0627\u0644\u0629 \u0644\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u064A\u0642\u0648\u0645 \u0627\u0644\u062E\u0627\u062F\u0645 \u0628\u0625\u0631\u0633\u0627\u0644 \u0646\u0633\u062E\u0629 \u0643\u0627\u0645\u0644\u0629 \u0645\u0646 \u0642\u0627\u0639\u062F\u0629 \u0627\u0644\u0628\u064A\u0627\u0646\u0627\u062A \u0625\u0644\u064A \u0627\u0644\u0645\u0633\u062A\u062E\u062F\u0645. \u0641\u064A \u0627\u0644\u0648\u0627\u0642\u0639, \u0641\u0625\u0646 \u0647\u0630\u0627 \u0647\u0648 \u0627\u0644\u0628\u0631\u0648\u062A\u0648\u0643\u0648\u0644 \u0627\u0644\u0645\u0645\u0643\u0646 \u0627\u0644\u0648\u062D\u064A\u062F \u0627\u0644\u0630\u064A \u064A\u064F\u062A\u064A\u062D \u0644\u0644\u0645\u0633\u062A\u062E\u062F\u0645 \u062E\u0635\u0648\u0635\u064A\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u0646\u0638\u0631\u064A\u0629 \u0641\u064A \u0633\u064A\u0627\u0642 \u062E\u0627\u062F\u0645 \u0648\u0627\u062D\u062F. \u0647\u0646\u0627\u0643 \u0637\u0631\u064A\u0642\u062A\u064A\u0646 \u0644\u0645\u0639\u0627\u0644\u062C\u0629 \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629: \u0627\u0644\u0623\u0648\u0644\u064A \u0647\u064A \u062C\u0639\u0644 \u0627\u0644\u062E\u0627\u062F\u0645 \u0645\u0642\u064A\u062F \u062D\u0633\u0627\u0628\u064A\u0627\u060C \u0648\u0627\u0644\u0623\u062E\u0631\u0649 \u0647\u064A \u0627\u0641\u062A\u0631\u0627\u0636 \u0623\u0646 \u0647\u0646\u0627\u0643 \u062E\u0648\u0627\u062F\u0645 \u0645\u062A\u0639\u062F\u062F\u0629 \u063A\u064A\u0631 \u0645\u062A\u0639\u0627\u0648\u0646\u0629/\u0645\u062A\u0631\u0627\u0628\u0637\u0629 \u064A\u0645\u062A\u0644\u0643 \u0643\u0644 \u0645\u0646\u0647\u0627 \u0646\u0633\u062E\u0629 \u0645\u0646 \u0642\u0627\u0639\u062F\u0629 \u0627\u0644\u0628\u064A\u0627\u0646\u0627\u062A. \u062A\u0645 \u0637\u0631\u062D \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629 \u0641\u064A \u0639\u0627\u0645 1995 \u0628\u0648\u0627\u0633\u0637\u0629 \u0643\u0648\u0631 \u0648\u062C\u0648\u0644\u062F\u0631\u064A\u062A\u0634 \u0648\u0643\u0627\u0634\u064A\u0644\u0641\u064A\u062A\u0632 \u0648\u0633\u0648\u062F\u0627\u0646 \u0641\u064A \u0633\u064A\u0627\u0642 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u0646\u0638\u0631\u064A\u0629 \u0648\u0641\u064A \u0639\u0627\u0645 1997 \u0628\u0648\u0627\u0633\u0637\u0629 \u0643\u0627\u0634\u064A\u0644\u0641\u064A\u062A\u0632 \u0648\u0623\u0648\u0633\u062A\u0631\u0648\u0641\u0633\u0643\u064A \u0641\u064A \u0627\u0644\u0633\u064A\u0627\u0642 \u0627\u0644\u062D\u0627\u0633\u0648\u0628\u064A. \u0645\u0646\u0630 \u0630\u0644\u0643 \u0627\u0644\u062D\u064A\u0646 \u062A\u0645 \u0627\u0643\u062A\u0634\u0627\u0641 \u062D\u0644\u0648\u0644 \u0641\u0639\u0627\u0644\u0629 \u0644\u0644\u063A\u0627\u064A\u0629. \u064A\u0645\u0643\u0646 \u062A\u062E\u0635\u064A\u0635 \u0642\u0627\u0639\u062F\u0629 \u0628\u064A\u0627\u0646\u0627\u062A \u0648\u0627\u062D\u062F\u0629 (\u062E\u0627\u0635\u0629 \u062D\u0627\u0633\u0648\u0628\u064A\u0627) \u0644\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u0645\u0639 \u0627\u062A\u0635\u0627\u0644 \u062B\u0627\u0628\u062A (\u0645\u0633\u062A\u0647\u0644\u0643) , \u0648\u0643\u0630\u0644\u0643 \u064A\u0645\u0643\u0646 \u0625\u0646\u0634\u0627\u0621 \u0642\u0627\u0639\u062F\u0629 \u0628\u064A\u0627\u0646\u0627\u062A k-database (\u0645\u0639\u0644\u0648\u0645\u0627\u062A\u064A\u0629 \u0646\u0638\u0631\u064A\u0629) \u0644\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629 PIR \u0628\u0627\u0633\u062A\u062E\u062F\u0627\u0645 \u0627\u0644\u0627\u062A\u0635\u0627\u0644 ."@ar . "1185840"^^ . . . . . "\u041F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u0435 \u0441\u043A\u0440\u044B\u0442\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 (\u0430\u043D\u0433\u043B. Private information retrieval (PIR)) \u0412 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0438, \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u043F\u043E\u0438\u0441\u043A\u0430 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 (PIR) \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u043F\u043E\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043B\u044E (\u0438\u043B\u0438 \u0438\u0433\u0440\u043E\u043A\u0443) \u043F\u043E\u043B\u0443\u0447\u0438\u0442\u044C \u0438\u043D\u0442\u0435\u0440\u0435\u0441\u0443\u044E\u0449\u0443\u044E \u0435\u0433\u043E \u0447\u0430\u0441\u0442\u043D\u0443\u044E \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u044E \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430. \u041F\u0440\u0438\u0447\u0451\u043C \u0441\u0435\u0440\u0432\u0435\u0440 \u043D\u0435 \u0441\u043C\u043E\u0436\u0435\u0442 \u0440\u0430\u0441\u043F\u043E\u0437\u043D\u0430\u0442\u044C \u043A\u0430\u043A\u0430\u044F \u0438\u043C\u0435\u043D\u043D\u043E \u0447\u0430\u0441\u0442\u044C \u0435\u0433\u043E \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u0441\u0442\u0430\u043B\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043D\u0430 \u0438\u0433\u0440\u043E\u043A\u0443. \u0417\u0430\u0434\u0430\u0447\u0430 : \u0415\u0441\u0442\u044C \u0431\u0430\u0437\u0430 \u0434\u0430\u043D\u043D\u044B\u0445 \u0441\u043E\u0441\u0442\u043E\u044F\u0449\u0430\u044F \u0438\u0437 \u0431\u0438\u0442\u043E\u0432. \u0415\u0441\u0442\u044C \u0438\u0433\u0440\u043E\u043A, \u043A\u043E\u0442\u043E\u0440\u044B\u0439 \u0445\u043E\u0447\u0435\u0442 \u0434\u043E\u0441\u0442\u0430\u0442\u044C \u0431\u0438\u0442 \u043D\u043E\u043C\u0435\u0440 \u0442\u0430\u043A \u0447\u0442\u043E\u0431\u044B \u0431\u0430\u0437\u0430 \u0434\u0430\u043D\u043D\u044B\u0445 \u0441\u043E\u0434\u0435\u0440\u0436\u0430\u0449\u0430\u044F \u0432\u0441\u0435 \u0431\u0438\u0442\u043E\u0432 \u043D\u0435 \u0441\u043C\u043E\u0433\u043B\u0430 \u0443\u0437\u043D\u0430\u0442\u044C \u043D\u0438\u043A\u0430\u043A\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043A\u0430\u043A\u043E\u0439 \u0438\u043C\u0435\u043D\u043D\u043E \u0431\u0438\u0442 \u0434\u043E\u0441\u0442\u0430\u043B \u0438\u0433\u0440\u043E\u043A.\u0422\u0440\u0438\u0432\u0438\u0430\u043B\u044C\u043D\u043E\u0435 (\u043D\u043E \u043D\u0435 \u044D\u0444\u0444\u0435\u043A\u0442\u0438\u0432\u043D\u043E\u0435) \u0440\u0435\u0448\u0435\u043D\u0438\u0435 \u0441\u043E\u0441\u0442\u043E\u0438\u0442 \u0432 \u043F\u043E\u0441\u044B\u043B\u043A\u0435 \u0432\u0441\u0435\u0445 \u0431\u0438\u0442\u043E\u0432 \u0438\u0433\u0440\u043E\u043A\u0443, \u0432\u043A\u043B\u044E\u0447\u0430\u044F \u0438\u0441\u043A\u043E\u043C\u044B\u0439 \u0438\u043C -\u0431\u0438\u0442. \u0414\u0440\u0443\u0433\u043E\u0439 \u043F\u0443\u0442\u044C \u2014 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 PIR-\u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0430 \u0433\u0434\u0435 \u0438\u0433\u0440\u043E\u043A \u0437\u0430\u0434\u0430\u0451\u0442 \u0432\u043E\u043F\u0440\u043E\u0441 (\u0444\u0443\u043D\u043A\u0446\u0438\u044E) \u0431\u0430\u0437\u0435 \u0434\u0430\u043D\u043D\u044B\u0445. \u041F\u043E\u0441\u043B\u0435\u0434\u043D\u044F\u044F \u0431\u0435\u0440\u0451\u0442 \u044D\u0442\u0443 \u0444\u0443\u043D\u043A\u0446\u0438\u044E, \u043F\u0440\u0438\u043B\u0430\u0433\u0430\u0435\u0442 \u0435\u0451 \u043A\u043E \u0432\u0441\u0435\u0439 \u0441\u043E\u0432\u043E\u043A\u0443\u043F\u043D\u043E\u0441\u0442\u0438 \u0431\u0430\u0437\u044B \u0434\u0430\u043D\u043D\u044B\u0445 \u0438 \u043F\u043E\u043B\u0443\u0447\u0430\u0435\u0442 \u043E\u0442\u0432\u0435\u0442, \u043A\u043E\u0442\u043E\u0440\u044B\u0439"@ru . . . . . . "\u5728\u5BC6\u78BC\u5B78\uFF0C\u79C1\u6709\u4FE1\u606F\u6AA2\u7D22\uFF08\u82F1\u8A9E\uFF1APrivate information retrieval\uFF0CPIR\uFF09\u5354\u8B70\u4EE4\u7528\u6236\u53EF\u4EE5\u5728\u4E0D\u62AB\u9732\u4E0B\u8F09\u9805\u76EE\u7684\u540C\u6642\uFF0C\u5F9E\u6301\u6709\u6578\u64DA\u5EAB\u7684\u4F3A\u670D\u5668\u4E0B\u8F09\u9805\u76EE\u3002 PIR\u4EA6\u53EF\u8996\u70BA\u4E00\u7A2E\u5F31\u5316\u7684n\u90781\u4E0D\u7D93\u610F\u50B3\u8F38\uFF08OT\uFF09\uFF0C\u4F46\u6709\u5340\u5225\uFF0C\u5728\u65BCOT\u4EA6\u8981\u6C42\u7528\u6237\u4E0D\u5F97\u7372\u5F97\u5176\u4ED6\u6578\u64DA\u9805\u76EE\u7684\u4FE1\u606F\u3002 \u4E00\u7A2E\u5E73\u51E1\u4F46\u6548\u7387\u5947\u4F4E\u7684PIR\u53EF\u4EE5\u901A\u904E\u8B93\u4F3A\u670D\u5668\u8907\u88FD\u6574\u500B\u6578\u64DA\u5EAB\uFF0C\u7136\u5F8C\u50B3\u9001\u7D66\u7528\u6236\u5BE6\u73FE\u3002\u5BE6\u969B\u4E0A\uFF0C\u55AE\u4F3A\u670D\u5668\uFF08\u4E0D\u8AD6\u662F\u7D93\u5178\u6216\u91CF\u5B50\uFF09\u8A2D\u5B9A\u4E0B\uFF0C\u9019\u662F\u552F\u4E00\u80FD\u4FE1\u606F\u5B78\u5B89\u5168\u5730\u4FDD\u8B77\u7528\u6236\u67E5\u8A62\u7684\u65B9\u6848\u3002\u6709\u5169\u7A2E\u65B9\u5F0F\u61C9\u5C0D\u9019\u500B\u554F\u984C\uFF1A\u8981\u9EBC\u5047\u8A2D\u4F3A\u670D\u5668\uFF0C\u8981\u9EBC\u5047\u8A2D\u6709\u82E5\u5E72\u500B\u76F8\u4E92\u4E0D\u4E32\u901A\u7684\u4F3A\u670D\u5668\uFF0C\u800C\u5404\u4F3A\u670D\u5668\u6301\u6709\u4E00\u4EFD\u6578\u64DA\u5EAB\u7684\u5099\u4EFD\u3002 \u8A72\u554F\u984C\u7684\u4FE1\u606F\u8AD6\u7248\u672C\u65BC1995\u5E74\u7531\uFF0C\uFF0C\u548C\u5F15\u5165\uFF0C\u8A08\u7B97\u7248\u672C\u5247\u65BC1997\u5E74\u7531\u548C\u63D0\u51FA\u3002\u4E4B\u5F8C\u53C8\u6709\u7814\u7A76\u8005\u63D0\u51FA\u4E86\u7406\u8AD6\u4E0A\u975E\u5E38\u9AD8\u6548\u7684\u65B9\u6848\u3002\u55AE\u4F3A\u670D\u5668\uFF08\u8A08\u7B97\u5B89\u5168\uFF09PIR\u53EA\u9808\uFF08\u5747\u6524\uFF09\u5E38\u6578\u901A\u4FE1 \uFF0C\u800Ck\u2014\u4F3A\u670D\u5668\uFF08\u4FE1\u606F\u5B78\u5B89\u5168\uFF09PIR\u5247\u53EF\u7528 \u901A\u8A0A\u5B8C\u6210\uFF08\u4F46\u4E0B\u754C\u4ECD\u7136\u662F\u8FD1\u4E4E\u7DDA\u6027\u7684\u91CF\u7D1A\uFF09\u3002"@zh . . . "Protocolo de recupera\u00E7\u00E3o de informa\u00E7\u00F5es privadas"@pt . . "\u041F\u043E\u043B\u0443\u0447\u0435\u043D\u0438\u0435 \u0441\u043A\u0440\u044B\u0442\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 (\u0430\u043D\u0433\u043B. Private information retrieval (PIR)) \u0412 \u043A\u0440\u0438\u043F\u0442\u043E\u0433\u0440\u0430\u0444\u0438\u0438, \u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B \u043F\u043E\u0438\u0441\u043A\u0430 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 (PIR) \u043F\u043E\u0437\u0432\u043E\u043B\u044F\u0435\u0442 \u043F\u043E\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043B\u044E (\u0438\u043B\u0438 \u0438\u0433\u0440\u043E\u043A\u0443) \u043F\u043E\u043B\u0443\u0447\u0438\u0442\u044C \u0438\u043D\u0442\u0435\u0440\u0435\u0441\u0443\u044E\u0449\u0443\u044E \u0435\u0433\u043E \u0447\u0430\u0441\u0442\u043D\u0443\u044E \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u044E \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430. \u041F\u0440\u0438\u0447\u0451\u043C \u0441\u0435\u0440\u0432\u0435\u0440 \u043D\u0435 \u0441\u043C\u043E\u0436\u0435\u0442 \u0440\u0430\u0441\u043F\u043E\u0437\u043D\u0430\u0442\u044C \u043A\u0430\u043A\u0430\u044F \u0438\u043C\u0435\u043D\u043D\u043E \u0447\u0430\u0441\u0442\u044C \u0435\u0433\u043E \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u0441\u0442\u0430\u043B\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043D\u0430 \u0438\u0433\u0440\u043E\u043A\u0443. \u0417\u0430\u0434\u0430\u0447\u0430 : \u0415\u0441\u0442\u044C \u0431\u0430\u0437\u0430 \u0434\u0430\u043D\u043D\u044B\u0445 \u0441\u043E\u0441\u0442\u043E\u044F\u0449\u0430\u044F \u0438\u0437 \u0431\u0438\u0442\u043E\u0432. \u0415\u0441\u0442\u044C \u0438\u0433\u0440\u043E\u043A, \u043A\u043E\u0442\u043E\u0440\u044B\u0439 \u0445\u043E\u0447\u0435\u0442 \u0434\u043E\u0441\u0442\u0430\u0442\u044C \u0431\u0438\u0442 \u043D\u043E\u043C\u0435\u0440 \u0442\u0430\u043A \u0447\u0442\u043E\u0431\u044B \u0431\u0430\u0437\u0430 \u0434\u0430\u043D\u043D\u044B\u0445 \u0441\u043E\u0434\u0435\u0440\u0436\u0430\u0449\u0430\u044F \u0432\u0441\u0435 \u0431\u0438\u0442\u043E\u0432 \u043D\u0435 \u0441\u043C\u043E\u0433\u043B\u0430 \u0443\u0437\u043D\u0430\u0442\u044C \u043D\u0438\u043A\u0430\u043A\u043E\u0439 \u0438\u043D\u0444\u043E\u0440\u043C\u0430\u0446\u0438\u0438 \u043A\u0430\u043A\u043E\u0439 \u0438\u043C\u0435\u043D\u043D\u043E \u0431\u0438\u0442 \u0434\u043E\u0441\u0442\u0430\u043B \u0438\u0433\u0440\u043E\u043A.\u0422\u0440\u0438\u0432\u0438\u0430\u043B\u044C\u043D\u043E\u0435 (\u043D\u043E \u043D\u0435 \u044D\u0444\u0444\u0435\u043A\u0442\u0438\u0432\u043D\u043E\u0435) \u0440\u0435\u0448\u0435\u043D\u0438\u0435 \u0441\u043E\u0441\u0442\u043E\u0438\u0442 \u0432 \u043F\u043E\u0441\u044B\u043B\u043A\u0435 \u0432\u0441\u0435\u0445 \u0431\u0438\u0442\u043E\u0432 \u0438\u0433\u0440\u043E\u043A\u0443, \u0432\u043A\u043B\u044E\u0447\u0430\u044F \u0438\u0441\u043A\u043E\u043C\u044B\u0439 \u0438\u043C -\u0431\u0438\u0442. \u0414\u0440\u0443\u0433\u043E\u0439 \u043F\u0443\u0442\u044C \u2014 \u0438\u0441\u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u043D\u0438\u0435 PIR-\u043F\u0440\u043E\u0442\u043E\u043A\u043E\u043B\u0430 \u0433\u0434\u0435 \u0438\u0433\u0440\u043E\u043A \u0437\u0430\u0434\u0430\u0451\u0442 \u0432\u043E\u043F\u0440\u043E\u0441 (\u0444\u0443\u043D\u043A\u0446\u0438\u044E) \u0431\u0430\u0437\u0435 \u0434\u0430\u043D\u043D\u044B\u0445. \u041F\u043E\u0441\u043B\u0435\u0434\u043D\u044F\u044F \u0431\u0435\u0440\u0451\u0442 \u044D\u0442\u0443 \u0444\u0443\u043D\u043A\u0446\u0438\u044E, \u043F\u0440\u0438\u043B\u0430\u0433\u0430\u0435\u0442 \u0435\u0451 \u043A\u043E \u0432\u0441\u0435\u0439 \u0441\u043E\u0432\u043E\u043A\u0443\u043F\u043D\u043E\u0441\u0442\u0438 \u0431\u0430\u0437\u044B \u0434\u0430\u043D\u043D\u044B\u0445 \u0438 \u043F\u043E\u043B\u0443\u0447\u0430\u0435\u0442 \u043E\u0442\u0432\u0435\u0442, \u043A\u043E\u0442\u043E\u0440\u044B\u0439 \u0432\u044B\u0441\u044B\u043B\u0430\u0435\u0442\u0441\u044F \u043E\u0431\u0440\u0430\u0442\u043D\u043E \u0438\u0433\u0440\u043E\u043A\u0443. \u0423\u0441\u043B\u043E\u0432\u0438\u044F \u044D\u0442\u043E\u0439 \u0438\u0433\u0440\u044B \u0441\u043B\u0435\u0434\u0443\u044E\u0449\u0438\u0435:1) \u0414\u043B\u0438\u043D\u0430 \u0441\u0443\u043C\u043C\u044B \u0432\u043E\u043F\u0440\u043E\u0441\u0430 (\u0444\u0443\u043D\u043A\u0446\u0438\u0438) \u0438 \u043E\u0442\u0432\u0435\u0442\u0430 \u0434\u043E\u043B\u0436\u043D\u0430 \u0431\u044B\u0442\u044C \u043C\u043D\u043E\u0433\u043E \u043C\u0435\u043D\u044C\u0448\u0435 \u0447\u0435\u043C n.2) \u0438\u0433\u0440\u043E\u043A \u0434\u043E\u043B\u0436\u0435\u043D \u0434\u043B\u044F \u043B\u044E\u0431\u043E\u0433\u043E \u043F\u043E\u0441\u043B\u0430\u0442\u044C \u0442\u0430\u043A\u043E\u0439 \u0432\u043E\u043F\u0440\u043E\u0441, \u0447\u0442\u043E\u0431\u044B \u043E\u0442\u0432\u0435\u0442 \u0431\u044B\u043B \u043F\u0440\u0430\u0432\u0438\u043B\u044C\u043D\u044B\u0439, \u0442\u043E \u0435\u0441\u0442\u044C -\u0431\u0438\u0442 \u0431\u044B\u043B \u0432\u0435\u0440\u043D\u043E \u043F\u043E\u043B\u0443\u0447\u0435\u043D.3) \u0411\u0430\u0437\u0430 \u0434\u0430\u043D\u043D\u044B\u0445 \u043D\u0435 \u043C\u043E\u0436\u0435\u0442 \u043D\u0438\u0447\u0435\u0433\u043E \u0443\u0437\u043D\u0430\u0442\u044C \u043F\u043E \u043F\u043E\u0432\u043E\u0434\u0443 . \u041F\u043E\u0441\u0442\u0430\u043D\u043E\u0432\u043A\u0430 \u0437\u0430\u0434\u0430\u0447\u0438 \u0434\u043B\u044F \u043D\u0435\u0441\u043A\u043E\u043B\u044C\u043A\u0438\u0445 \u043A\u043E\u043F\u0438\u0439 \u0431\u0430\u0437\u044B \u0434\u0430\u043D\u043D\u044B\u0445 \u0431\u044B\u043B\u0430 \u0432\u043F\u0435\u0440\u0432\u044B\u0435 \u0441\u0444\u043E\u0440\u043C\u0443\u043B\u0438\u0440\u043E\u0432\u0430\u043D\u0430 \u0428\u043E\u0440\u043E\u043C, \u0413\u043E\u043B\u0434\u0440\u0430\u0439\u0445\u043E\u043C, \u041A\u0443\u0448\u0435\u043B\u0435\u0432\u0438\u0446\u0435\u043C \u0438 \u0421\u0443\u0434\u0430\u043D\u043E\u043C \u0432 1996 \u0433. \u0410\u0432\u0442\u043E\u0440\u044B \u043F\u0440\u0435\u0434\u043B\u043E\u0436\u0438\u043B\u0438 \u0440\u0435\u0448\u0435\u043D\u0438\u0435 [1] \u043A\u043E\u0442\u043E\u0440\u043E\u0435 \u0442\u0440\u0435\u0431\u043E\u0432\u0430\u043B\u043E \u043D\u0435\u0441\u043A\u043E\u043B\u044C\u043A\u0438\u0445 \u043A\u043E\u043F\u0438\u0439 \u0431\u0430\u0437\u044B \u0434\u0430\u043D\u043D\u044B\u0445 -- \u0438 \u0447\u0442\u043E\u0431\u044B \u0441\u0435\u0440\u0432\u0435\u0440\u044B, \u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0435 \u044D\u0442\u0438 \u043A\u043E\u043F\u0438\u0438, \u043D\u0435 \u0438\u043C\u0435\u043B\u0438 \u043F\u0440\u0430\u0432\u0430 \u0434\u0440\u0443\u0433 \u0441 \u0434\u0440\u0443\u0433\u043E\u043C \u043E\u0431\u0449\u0430\u0442\u044C\u0441\u044F. \u0412\u043F\u0435\u0440\u0432\u044B\u0435 \u0440\u0435\u0448\u0435\u043D\u0438\u0435 \u0442\u043E\u0439 \u0436\u0435 \u0437\u0430\u0434\u0430\u0447\u0438 \u0434\u043B\u044F \u043E\u0434\u043D\u043E\u0433\u043E \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438 \u043E\u0434\u043D\u043E\u0433\u043E \u0438\u0433\u0440\u043E\u043A\u0430 \u0434\u0430\u043B\u0438 \u0438 \u0420\u0430\u0444\u0430\u0438\u043B \u041E\u0441\u0442\u0440\u043E\u0432\u0441\u043A\u0438\u0439 \u0432 1997 \u0433. \u041E\u043D\u0438 \u043F\u043E\u043A\u0430\u0437\u0430\u043B\u0438[2] \u0447\u0442\u043E \u0434\u043B\u0438\u043D\u0430 \u0441\u0443\u043C\u043C\u044B \u0432\u043E\u043F\u0440\u043E\u0441\u0430 \u0438 \u043E\u0442\u0432\u0435\u0442\u0430 \u0440\u0430\u0432\u043D\u0430 \u0434\u043B\u044F \u043B\u044E\u0431\u043E\u0433\u043E .\u0423\u043A\u0430\u0437\u0430\u043D\u043D\u044B\u0435 \u0440\u0430\u0431\u043E\u0442\u044B \u0434\u0430\u043B\u0438 \u0442\u043E\u043B\u0447\u043E\u043A \u0438\u043D\u0442\u0435\u043D\u0441\u0438\u0432\u043D\u043E\u043C\u0443 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044E \u0434\u0430\u043D\u043D\u043E\u0433\u043E \u0440\u0430\u0437\u0434\u0435\u043B\u0430 Private Information Retrieval."@ru . "Na criptografia, um protocolo de recupera\u00E7\u00E3o de informa\u00E7\u00F5es privadas (PIR) \u00E9 um protocolo que permite ao usu\u00E1rio recuperar um item de um servidor na posse de um banco de dados sem revelar qual item \u00E9 recuperado. O PIR \u00E9 uma vers\u00E3o mais fraca da , onde tamb\u00E9m \u00E9 necess\u00E1rio que o usu\u00E1rio n\u00E3o obtenha informa\u00E7\u00F5es sobre outros itens do banco de dados.Uma maneira trivial, mas muito ineficiente de obter o PIR, \u00E9 o servidor enviar uma c\u00F3pia inteira do banco de dados ao usu\u00E1rio. De fato, esse \u00E9 o \u00FAnico protocolo poss\u00EDvel (na configura\u00E7\u00E3o cl\u00E1ssica ou qu\u00E2ntica) que oferece privacidade te\u00F3rica \u00E0s informa\u00E7\u00F5es do usu\u00E1rio para sua consulta em uma configura\u00E7\u00E3o de servidor \u00FAnico. H\u00E1 duas maneiras cl\u00E1ssicas de resolver esse problema: uma \u00E9 tornar o servidor limitado computacionalmente e a outra \u00E9 assumir que"@pt . . . . . . "\u0627\u0633\u062A\u0639\u0627\u062F\u0629 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062A \u0627\u0644\u062E\u0627\u0635\u0629"@ar . . . . . . . . . . . .