Efficient computationally private information retrieval from anonymity or trapdoor groups

0Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A Private Information Retrieval (PIR) protocol allows a user to obtain information from a database in a manner that prevents the database from knowing which data was retrieved. Although substantial progress has been made in the discovery of computationally PIR (cPIR) protocols with reduced communication complexity, there has been relatively little work in reducing the computational complexity of cPIR protocols. In particular, Sion and Carbunar argue that existing cPIR protocols are slower than the trivial PIR protocol (in overall performance). In this paper, we present a new family of cPIR protocols with a variety of security and performance properties. Our protocols enable much lower CPU overhead for the database server. When the database is viewed as a bit sequence, only addition operations are performed by the database server. The security of the general version of our protocol depends on either a Hidden Modular Group Order (HMGO) assumption, (a new assumption), or sender anonymity, and we present two specialized protocols, each of which depends on one of the two assumptions, respectively. For our trapdoor group protocol, we assume (the HMGO assumption) that given only the elements be 1,.., bet in the group ℤt, where ei

Cite

CITATION STYLE

APA

Trostle, J., & Parrish, A. (2011). Efficient computationally private information retrieval from anonymity or trapdoor groups. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6531 LNCS, pp. 114–128). Springer Verlag. https://doi.org/10.1007/978-3-642-18178-8_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free