We also strengthen the privacy guarantees. The oblivious search protocol not only hides (from the server) the outsourced data but also does not leak client access patterns, the queries themselves, the association between previously searched keywords and returned documents or between newly added documents and their corresponding keywords (not even in encrypted form). This comes naturally at the expense of additional computation costs which we analyze in the context of today's off the shelf hardware. In a reasonable scenario, a single CPU off-the-shelf PC can easily handle hundreds of such oblivious searches per minute.
Category / Keywords: cryptographic protocols / Date: received 10 Jun 2005, withdrawn 21 Nov 2005 Contact author: sion at cs stonybrook edu Available formats: (-- withdrawn --) Version: 20051121:151013 (All versions of this report) Discussion forum: Show discussion | Start new discussion