Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials
Figure 2
Communication cost comparisons varying with from to when setting the security parameter in our PIR protocol and in PIR protocols [6, 7] for achieving certain security level.