Research Article

Efficient Private Information Retrieval Protocol with Homomorphically Computing Univariate Polynomials

Figure 2

Communication cost comparisons varying with from to when setting the security parameter in our PIR protocol and in PIR protocols [6, 7] for achieving certain security level.