scholarly journals Private Information Retrieval Using Trusted Hardware

Author(s):  
Shuhong Wang ◽  
Xuhua Ding ◽  
Robert H. Deng ◽  
Feng Bao
Author(s):  
Łukasz Krzywiecki ◽  
Mirosław Kutyłowski ◽  
Hubert Misztela ◽  
Tomasz Strumiński

2016 ◽  
Vol 2016 (2) ◽  
pp. 155-174 ◽  
Author(s):  
Carlos Aguilar-Melchor ◽  
Joris Barrier ◽  
Laurent Fousse ◽  
Marc-Olivier Killijian

AbstractA Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutuallydistrustful replicated databases, trusted hardware, or cryptography. In this paper we focus on the later setting which is known as single-database computationally- Private Information Retrieval (cPIR). Classic cPIR protocols require that the database server executes an algorithm over all the database content at very low speeds which impairs their usage. In [1], given certain assumptions, realistic at the time, Sion and Carbunar showed that cPIR schemes were not practical and most likely would never be. To this day, this conclusion is widely accepted by researchers and practitioners. Using the paradigm shift introduced by lattice-based cryptography, we show that the conclusion of Sion and Carbunar is not valid anymore: cPIR is of practical value. This is achieved without compromising security, using standard crytosystems, and conservative parameter choices.


Author(s):  
Xiang Zhang ◽  
Kai Wan ◽  
Hua Sun ◽  
Mingyue Ji ◽  
Giuseppe Caire

Sign in / Sign up

Export Citation Format

Share Document