Private Information Retrieval Using Trusted Hardware

Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impractical to deploy due to the prohibitively high communication and computation complexity. The recent trend in outsourcing databases f...

Full description

Saved in:
Bibliographic Details
Main Authors: WANG, Shuhong, DING, Xuhua, DENG, Robert H., BAO, Feng
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2006
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/567
https://ink.library.smu.edu.sg/context/sis_research/article/1566/viewcontent/2006_208.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1566
record_format dspace
spelling sg-smu-ink.sis_research-15662019-01-02T08:21:14Z Private Information Retrieval Using Trusted Hardware WANG, Shuhong DING, Xuhua DENG, Robert H. BAO, Feng Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impractical to deploy due to the prohibitively high communication and computation complexity. The recent trend in outsourcing databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system by making use of trusted hardware. Our system is proven to be information theoretically secure. Furthermore, we derive the computation complexity lower bound for hardware-based PIR schemes and show that our construction meets the lower bounds for both the communication and computation costs, respectively. 2006-07-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/567 info:doi/10.1007/11863908_4 https://ink.library.smu.edu.sg/context/sis_research/article/1566/viewcontent/2006_208.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
WANG, Shuhong
DING, Xuhua
DENG, Robert H.
BAO, Feng
Private Information Retrieval Using Trusted Hardware
description Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impractical to deploy due to the prohibitively high communication and computation complexity. The recent trend in outsourcing databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system by making use of trusted hardware. Our system is proven to be information theoretically secure. Furthermore, we derive the computation complexity lower bound for hardware-based PIR schemes and show that our construction meets the lower bounds for both the communication and computation costs, respectively.
format text
author WANG, Shuhong
DING, Xuhua
DENG, Robert H.
BAO, Feng
author_facet WANG, Shuhong
DING, Xuhua
DENG, Robert H.
BAO, Feng
author_sort WANG, Shuhong
title Private Information Retrieval Using Trusted Hardware
title_short Private Information Retrieval Using Trusted Hardware
title_full Private Information Retrieval Using Trusted Hardware
title_fullStr Private Information Retrieval Using Trusted Hardware
title_full_unstemmed Private Information Retrieval Using Trusted Hardware
title_sort private information retrieval using trusted hardware
publisher Institutional Knowledge at Singapore Management University
publishDate 2006
url https://ink.library.smu.edu.sg/sis_research/567
https://ink.library.smu.edu.sg/context/sis_research/article/1566/viewcontent/2006_208.pdf
_version_ 1770570480919511040