scispace - formally typeset
Open AccessBook ChapterDOI

An Efficient PIR Construction Using Trusted Hardware

Reads0
Chats0
TLDR
Using the trusted hardware based model, the computation complexity of the scheme, including offline computation, is linear to the number of queries and is bounded by ${\mathrm{O}}(\sqrt{n})$ after optimization.
Abstract
For a private information retrieval (PIR) scheme to be deployed in practice, low communication complexity and low computation complexity are two fundamental requirements it must meet. Most existing PIR schemes only focus on the communication complexity. The reduction on the computational complexity did not receive the due treatment mainly because of its O(n) lower bound. By using the trusted hardware based model, we design a novel scheme which breaks this barrier. With constant storage, the computation complexity of our scheme, including offline computation, is linear to the number of queries and is bounded by ${\mathrm{O}}(\sqrt{n})$ after optimization.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

RAID-PIR: Practical Multi-Server PIR

TL;DR: RAID-PIR is introduced, an efficient and simple multi-server PIR scheme, which has similar approach to RAID (Redundant Arrays of Inexpensive Disks) systems, and is well-suited for cloud deployment as it reduces the communication as well as the computational workload per server.
Book

Cryptography for Security and Privacy in Cloud Computing

TL;DR: This resource offers an overview of the possibilities of cryptography for protecting data and identity information, much beyond well-known cryptographic primitives such as encryption or digital signatures.
Journal ArticleDOI

A Hybrid Scheme for Authenticating Scalable Video Codestreams

TL;DR: The analysis and experimental results indicate that the HAU is able to detect malicious manipulations and locate the tampered image regions while is robust to content-preserving manipulations for enhancement layers.
Journal ArticleDOI

Data privacy

TL;DR: These are the main topics related to data privacy and privacy‐enhancing technologies that have attracted the interest of researchers, practitioners, and companies.
Journal ArticleDOI

Database Access Pattern Protection Without Full-Shuffles

TL;DR: A novel scheme in the same model with provable security, which only shuffles a portion of the database, which can protect the access pattern privacy of databases of billions of entries, at a lower cost than those using ORAM-based poly-logarithm algorithms.
References
More filters
Journal ArticleDOI

Private information retrieval

TL;DR: This work describes schemes that enable a user to access k replicated copies of a database and privately retrieve information stored in the database, so that each individual server gets no information on the identity of the item retrieved by the user.
Journal ArticleDOI

Software protection and simulation on oblivious RAMs

TL;DR: This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.
Proceedings ArticleDOI

Private information retrieval

TL;DR: Schemes that enable a user to access k replicated copies of a database and privately retrieve information stored in the database and get no information on the identity of the item retrieved by the user are described.
Proceedings ArticleDOI

Replication is not needed: single database, computationally-private information retrieval

TL;DR: Based on the quadratic residuosity assumption, a single database, computationally private information retrieval scheme with O(n/sup /spl epsiv//) communication complexity for any /spl Epsiv/>0.0 is presented.