Private Information Retrieval with a Trusted Hardware Unit – Revisited

Author(s):  
Łukasz Krzywiecki ◽  
Mirosław Kutyłowski ◽  
Hubert Misztela ◽  
Tomasz Strumiński
2016 ◽  
Vol 2016 (2) ◽  
pp. 155-174 ◽  
Author(s):  
Carlos Aguilar-Melchor ◽  
Joris Barrier ◽  
Laurent Fousse ◽  
Marc-Olivier Killijian

AbstractA Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutuallydistrustful replicated databases, trusted hardware, or cryptography. In this paper we focus on the later setting which is known as single-database computationally- Private Information Retrieval (cPIR). Classic cPIR protocols require that the database server executes an algorithm over all the database content at very low speeds which impairs their usage. In [1], given certain assumptions, realistic at the time, Sion and Carbunar showed that cPIR schemes were not practical and most likely would never be. To this day, this conclusion is widely accepted by researchers and practitioners. Using the paradigm shift introduced by lattice-based cryptography, we show that the conclusion of Sion and Carbunar is not valid anymore: cPIR is of practical value. This is achieved without compromising security, using standard crytosystems, and conservative parameter choices.


Author(s):  
Xiang Zhang ◽  
Kai Wan ◽  
Hua Sun ◽  
Mingyue Ji ◽  
Giuseppe Caire

Sign in / Sign up

Export Citation Format

Share Document