Cryptology ePrint Archive: Report 2006/208
Private Information Retrieval Using Trusted Hardware
Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao
Abstract: Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past
years. Though information theoretically secure, most of them are impractical to deploy due to the
prohibitively high communication and computation complexity. The recent trend in outsourcing
databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system
by making use of trusted hardware. Our system is proven to be information theoretically secure.
Furthermore, we derive the computation complexity lower bound for hardware-based PIR schemes and
show that our construction meets the lower bounds for both the communication and computation costs,
respectively.
Category / Keywords: applications / Private Information Retrieval, Trusted Computing
Publication Info: This is the full version of the paper at ESORICS 2006
Date: received 22 Jun 2006, last revised 26 Jun 2006
Contact author: godintears at gmail com
Available format(s): Postscript (PS) | Compressed Postscript (PS.GZ) | PDF | BibTeX Citation
Version: 20060627:020832 (All versions of this report)
Short URL: ia.cr/2006/208
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]