Advertisement

An Efficient PIR Construction Using Trusted Hardware

  • Yanjiang Yang
  • Xuhua Ding
  • Robert H. Deng
  • Feng Bao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5222)

Abstract

For a private information retrieval (PIR) scheme to be deployed in practice, low communication complexity and low computation complexity are two fundamental requirements it must meet. Most existing PIR schemes only focus on the communication complexity. The reduction on the computational complexity did not receive the due treatment mainly because of its O(n) lower bound. By using the trusted hardware based model, we design a novel scheme which breaks this barrier. With constant storage, the computation complexity of our scheme, including offline computation, is linear to the number of queries and is bounded by \({\mathrm{O}}(\sqrt{n})\) after optimization.

Keywords

Binary Search Access Pattern User Query Query Execution Protocol Execution 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Arnold, T., Doorn, L.V.: The ibm pcixcc: A new cryptographic coprocessor for the ibm eserver. Journal of Research and Development 48 (May 2004)Google Scholar
  2. 2.
    Beimel, A., Ishai, Y., Kushilevitz, E., Raymond, J.-F.: Breaking the o(n 1/(2k − 1)) barrier for information-theoretic private information retrieval. In: Proceedings of IEEE FOCS 2002, pp. 261–270 (2002)Google Scholar
  3. 3.
    Beimel, A., Ishai, Y., Malkin, T.: Reducing the servers computation in private information retrieval: PIR with preprocessing. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 55–73. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  4. 4.
    Chor, B., Gilboa, N.: Computationally private information retrieval. In: Proceedings of the 29th STOC 1997, pp. 304–313 (1997)Google Scholar
  5. 5.
    Chor, B., Kushilevitz, E., Goldreich, O., Sudan, M.: Private information retrieval. In: Proceedings of IEEE FOCS 1995, pp. 41–51 (1995)Google Scholar
  6. 6.
    Goldreich, O., Ostrovsky, R.: Software protection and simulation on oblivious rams. Journal of the ACM 43(3), 431–473 (1996)MATHCrossRefMathSciNetGoogle Scholar
  7. 7.
    Iliev, A., Smith, S.: Private information storage with logarithm-space secure hardware. In: Proceedings of International Information Security Workshops, pp. 199–214 (2004)Google Scholar
  8. 8.
    Iliev, A., Smith, S.: Protecting client privacy with trusted computing at the server. IEEE Security & Privacy 3(2), 20–28 (2005)CrossRefGoogle Scholar
  9. 9.
    Kushilevitz, E., Ostrovsky, R.: Replication is not needed: single database, computationally private information retrieval. In: Proceeding of the 38th IEEE FOCS 1997, pp. 364–373 (1997)Google Scholar
  10. 10.
    Kushilevitz, E., Ostrovsky, R.: One-way trapdoor permutations are sufficient for non-trivial single-server private information retrieval. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 104–121. Springer, Heidelberg (2000)CrossRefGoogle Scholar
  11. 11.
    Ostrovsky, R., Shoup, V.: Private information storage. In: Proceedings of the 29th STOC 1997, pp. 294–303 (1997)Google Scholar
  12. 12.
    Sion, R., Carbunar, B.: On the computational practicality of private information retrieval. In: Proceedings of NDSS 2007 (2007)Google Scholar
  13. 13.
    Smith, S., Safford, D.: Practical server privacy with secure coprocessors. IBM Systems Journal 40(3), 683–695 (2001)CrossRefGoogle Scholar
  14. 14.
    Wang, S., Ding, X., Deng, R., Bao, F.: Private information retrieval using trusted hardware. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 49–64. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  15. 15.
    Williams, P., Sion, R.: Usable PIR. In: Proceedings of NDSS 2008 (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Yanjiang Yang
    • 1
    • 2
  • Xuhua Ding
    • 1
  • Robert H. Deng
    • 1
  • Feng Bao
    • 2
  1. 1.School of Information SystemsSingapore Management UniversitySingapore
  2. 2.Institute for Infocomm ResearchSingapore

Personalised recommendations