首页> 外文会议>Privacy Enhancing Technologies Symposium >The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency
【24h】

The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency

机译:两个世界中最好的:结合信息 - 理论和计算PIR进行通信效率

获取原文

摘要

The goal of Private Information Retrieval (PIR) is the ability to query a database successfully without the operator of the database server discovering which record(s) of the database the querier is interested in. There are two main classes of PIR protocols: those that provide privacy guarantees based on the computational limitations of servers (CPIR) and those that rely on multiple servers not colluding for privacy (IT-PIR). These two classes have different advantages and disadvantages that make them more or less attractive to designers of PIR-enabled privacy enhancing technologies. We present a hybrid PIR protocol that combines two PIR protocols, one from each of these classes. Our protocol inherits many positive aspects of both classes and mitigates some of the negative aspects. For example, our hybrid protocol maintains partial privacy when the security assumptions of one of the component protocols is broken, mitigating the privacy loss in such an event. We have implemented our protocol as an extension of the Percy++ library so that it combines a PIR protocol by Aguilar Melchor and Gaborit with one by Goldberg. We show that our hybrid protocol uses less communication than either of these component protocols and that our scheme is particularly beneficial when the number of records in a database is large compared to the size of the records. This situation arises in applications such as TLS certificate verification, anonymous communications systems, private LDAP lookups, and others.
机译:私人信息检索(PIR)的目标是在没有数据库服务器的运营商发现Querier对数据库的操作员查询数据库的能力。有感兴趣的数据库的记录。有两个主要类别的PIR协议:那些根据服务器(CPIR)的计算限制提供隐私保障,以及依赖于不勾结隐私的多个服务器(IT-PIR)的计算限制。这两种课程具有不同的优点和缺点,使他们对先发制的隐私增强技术的设计者来说或多或少有吸引力。我们提出了一种混合PIR协议,它结合了两个PIR协议,其中一个类别。我们的协议继承了两个类的许多积极方面,并减轻了一些负面方面。例如,当组件协议的安全假设被打破时,我们的混合协议维护部分隐私,减轻这种事件中的隐私损失。我们已经实施了我们的协议作为Percy ++图书馆的扩展,以便它将PIR协议与Gaborit一个由Goldberg结合起来。我们表明,当数据库中的记录数与记录的大小相比,我们的混合协议使用比这些组件协议中的任何一个较少的通信,并且我们的方案特别有益。这种情况出现在TLS证书验证,匿名通信系统,私人LDAP查找等的应用程序中。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号