Paper 2006/208

Private Information Retrieval Using Trusted Hardware

Shuhong Wang, Xuhua Ding, Robert Deng, and Feng Bao

Abstract

Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impractical to deploy due to the prohibitively high communication and computation complexity. The recent trend in outsourcing databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system by making use of trusted hardware. Our system is proven to be information theoretically secure. Furthermore, we derive the computation complexity lower bound for hardware-based PIR schemes and show that our construction meets the lower bounds for both the communication and computation costs, respectively.

Metadata
Available format(s)
PDF PS
Category
Applications
Publication info
Published elsewhere. This is the full version of the paper at ESORICS 2006
Keywords
Private Information RetrievalTrusted Computing
Contact author(s)
godintears @ gmail com
History
2006-06-27: revised
2006-06-26: received
See all versions
Short URL
https://ia.cr/2006/208
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/208,
      author = {Shuhong Wang and Xuhua Ding and Robert Deng and Feng Bao},
      title = {Private Information Retrieval Using Trusted Hardware},
      howpublished = {Cryptology {ePrint} Archive, Paper 2006/208},
      year = {2006},
      url = {https://eprint.iacr.org/2006/208}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.