Computationally Inexpensive cPIR

نویسندگان

  • William Gasarch
  • Arkady Yerukhimovich
چکیده

Computational Private Information Retrieval(cPIR) schemes allow a user to retrieve data from a database privately while exchanging only a small amount of data between the database and the user, where the privacy is based on a cryptographic assumption. All previous cPIR protocols require the database to compute a modular multiplication for every bit of the database on each query, making them too computationally expensive to be practical. In this paper, we propose two protocols that achieve the O(n ) communication complexity of previous protocols, while significantly reducing the amount of computation that must be done per query.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Multi-query Computationally-Private Information Retrieval with Constant Communication Rate

A fundamental privacy problem in the client-server setting is the retrieval of a record from a database maintained by a server so that the computationally bounded server remains oblivious to the index of the record retrieved while the overall communication between the two parties is smaller than the database size. This problem has been extensively studied and is known as computationally private...

متن کامل

Efficient Computationally Private Information Retrieval from Anonymity or Trapdoor Groups

A Private Information Retrieval (PIR) protocol allows a database user, or client, to obtain information from a database in a manner that prevents the database from knowing which data was retrieved. Although substantial progress has been made in the discovery of computationally PIR (cPIR) protocols with reduced communication complexity, there has been relatively little work in reducing the compu...

متن کامل

A Simpler Rate-Optimal CPIR Protocol

In PETS 2015, Kiayias, Leonardos, Lipmaa, Pavlyk, and Tang proposed the first (n, 1)CPIR protocol with rate 1− o(1). They use advanced techniques from multivariable calculus (like the Newton-Puiseux algorithm) to establish optimal rate among a large family of different CPIR protocols. It is only natural to ask whether one can achieve similar rate but with a much simpler analysis. We propose par...

متن کامل

XPIR : Private Information Retrieval for Everyone

A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutually-distrustful replicated databases, trusted hardware, or cryptography. In this paper we focus on the later setting which is known as singledatabase computationally-Private Information Retrieval (cPIR)....

متن کامل

Hiding Access Patterns in Range Queries Using Private Information Retrieval and ORAM

We study the problem of privacy preserving range search that provides data, query, and response confidentiality to the users for range queries. We propose two methods based on Private Information Retrieval (PIR) and Oblivious RAM (ORAM) techniques. For PIR-based queries, Lipmaa’s computationally-private information retrieval (CPIR) scheme is employed. For the ORAM-based method, Stefanov et al.’...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007