More robust private information retrieval scheme

被引:0
|
作者
Chen, Chun-Hua [1 ,2 ]
Horng, Gwoboa [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[2] Chien Kuo Technol Univ, Dept Elect Engn, Changhua, Taiwan
关键词
private information retrieval (PIR); mutual authentication; DSA algorithm; secure coprocessor (SC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In e-commerce, the protection of users' privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated and solved. A PIR scheme allows a user to retrieve a data item from an online database while hiding the identity of the item from a database server. In this paper, a new PIR scheme using a secure coprocessor (SC) and including mutual authentication by DSA signature algorithm for protecting the privacy of users, is proposed. Because of using only one server and including the mutual authentication process in the proposed scheme, it is more efficient and more robust (secure) in the real e-commerce environment compared with previous PIR solutions. In addition, a security analysis (proof) for the proposed scheme and comparisons to other PIR schemes are given.
引用
收藏
页码:297 / +
页数:2
相关论文
共 50 条
  • [31] Tutorial: Private Information Retrieval
    Henry, Ryan
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 2608 - 2612
  • [32] Efficient private information retrieval
    Itoh, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 11 - 20
  • [33] Nearly private information retrieval
    Chakrabarti, Amit
    Shubina, Anna
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2007, PROCEEDINGS, 2007, 4708 : 383 - +
  • [34] Noisy Private Information Retrieval
    Banawan, Karim
    Ulukus, Sennur
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 1694 - 1698
  • [35] Verifiable Private Information Retrieval
    Ben-David, Shany
    Kalai, Yael Tauman
    Paneth, Omer
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT III, 2022, 13749 : 3 - 32
  • [36] Committed Private Information Retrieval
    Cao, Quang
    Tran, Hong Yen
    Dau, Son Hoang
    Yi, Xun
    Viterbo, Emanuele
    Feng, Chen
    Huang, Yu-Chih
    Zhu, Jingge
    Kruglik, Stanislav
    Kiah, Han Mao
    COMPUTER SECURITY - ESORICS 2023, PT I, 2024, 14344 : 393 - 413
  • [37] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (07) : 4075 - 4088
  • [38] Timely Private Information Retrieval
    Banawan, Karim
    Arafa, Ahmed
    Ulukus, Sennur
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 2268 - 2273
  • [39] Private Stateful Information Retrieval
    Patel, Sarvar
    Persiano, Giuseppe
    Yeo, Kevin
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1002 - 1019
  • [40] Hypercubes and Private Information Retrieval
    Basu, Anirban
    Xu, Rui
    Corena, Juan Camilo
    Kiyomoto, Shinsaku
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 509 - 515