Private information retrieval /

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service prov...

Full description

Bibliographic Details
Main Authors: Yi, Xun (College teacher), (Author), Paulet, Russell, (Author), Bertino, Elisa, (Author)
Format: eBook
Language:English
Published: [San Rafael, California] : Morgan & Claypool Publishers, [2013]
Series:Synthesis lectures on information security, privacy and trust ; #5.
Subjects:
Online Access:View fulltext via EzAccess
LEADER 06793cam a2200781Ii 4500
001 26414
005 20150319123322.0
006 m eo d
007 cr cn||||m|||a
008 131017s2013 caua fob 000 0 eng d
019 # # |a 862048561  |a 868160728 
020 # # |a 9781627051545  |q (electronic bk.) 
020 # # |a 1627051546  |q (electronic bk.) 
020 # # |q (pbk.)  |z 9781627051538 
020 # # |a 1627051538 
020 # # |a 9781627051538 
024 7 # |a 10.2200/S00524ED1V01Y201307SPT005  |2 doi 
035 # # |a (OCoLC)860910026  |z (OCoLC)862048561  |z (OCoLC)868160728 
037 # # |a CL0500000354  |b Safari Books Online 
040 # # |a CaBNvSL  |b eng  |c J2I  |d UMI  |d DEBSZ  |d EBLCP  |d E7B  |d WAU  |d YDXCP  |d N$T  |d COO  |d UIU  |d J2I  |d OCLCF  |d OCLCQ  |e pn  |e rda 
049 # # |a MAIN 
050 # 4 |a ZA3075  |b .Y56 2013 
072 # 7 |a LAN  |x 025000  |2 bisacsh 
082 0 4 |a 025.524  |2 23 
100 1 # |a Yi, Xun  |c (College teacher),  |e author. 
245 1 0 |a Private information retrieval /  |c Xun Yi, Russell Paulet, Elisa Bertino. 
264 # 1 |a [San Rafael, California] :  |b Morgan & Claypool Publishers,  |c [2013] 
300 # # |a 1 online resource (xv, 98 pages) :  |b illustrations. 
336 # # |a text  |b txt  |2 rdacontent 
337 # # |a computer  |b c  |2 rdamedia 
338 # # |a online resource  |b cr  |2 rdacarrier 
490 1 # |a Synthesis lectures on information security, privacy, & trust,  |v #5  |x 1945-9750 ; 
504 # # |a Includes bibliographical references (pages 87-95). 
505 0 # |a 1. Classic private information retrieval -- 1.1 Introduction -- 1.2 Security model for private information retrieval -- 1.3 Private information retrieval protocols -- 1.3.1 Kushilevitz-Ostrovsky PIR protocol -- 1.3.2 Chang PIR protocol -- 1.3.3 Gentry-Razman PIR protocol -- 1.4 Security model for oblivious transfer -- 1.5 Oblivious transfer protocols -- 1.5.1 Even-Goldreich-Lempel OT12 protocol -- 1.5.2 Naor-Pinkas OTn1 protocol -- 1.5.3 Naor-Pinkas OTnkx1 protocol -- 1.6 Relationship between PIR and OT -- 1.7 Conclusion. 
505 8 # |a 2. FHE-based private information retrieval -- 2.1 Introduction -- 2.2 Fully homomorphic encryption -- 2.2.1 FHE definition -- 2.2.2 DGHV somewhat scheme -- 2.3 Generic single-database PIR from FHE -- 2.3.1 Response generation circuit -- 2.3.2 Generic single-database PIR from FHE -- 2.3.3 Generic single-database PBR from FHE -- 2.4 Practical single-database PIR from FHE -- 2.4.1 A variant of DGHV somewhat scheme -- 2.4.2 Practical single-database PBR from V-DGHV scheme -- 2.5 Security analysis -- 2.6 Performance analysis -- 2.6.1 Theoretic performance analysis -- 2.6.2 Experiment -- 2.6.3 Comparison -- 2.7 Conclusion. 
505 8 # |a 3. Private data warehouse queries -- 3.1 Introduction -- 3.2 Boneh-Goh-Nissim cryptosystem -- 3.2.1 Bilinear group -- 3.2.2 Boneh-Goh-Nissim encryption scheme -- 3.2.3 Homomorphic properties -- 3.3 Private data warehouse queries -- 3.3.1 Model -- 3.3.2 Private cell retrieval -- 3.3.3 Private OLAP operations -- 3.3.4 Private statistical analysis -- 3.4 Security and performance analysis -- 3.4.1 Security analysis -- 3.4.2 Performance analysis -- 3.5 Experimental evaluation -- 3.6 Conclusion. 
505 8 # |a 4. Privacy-preserving location-based queries -- 4.1 Introduction -- 4.2 Model -- 4.2.1 Notations -- 4.2.2 System model -- 4.2.3 Security model -- 4.3 Privacy-preserving location-based query -- 4.3.1 Protocol summary -- 4.3.2 Initialization -- 4.3.3 Oblivious transfer phase -- 4.3.4 Private information retrieval phase -- 4.4 Security analysis -- 4.4.1 Client's security -- 4.4.2 Server's security -- 4.5 Performance analysis -- 4.5.1 Computation -- 4.5.2 Communication -- 4.6 Experimental evaluation -- 4.6.1 Experimental parameters -- 4.6.2 Experimental results -- 4.7 Conclusion. 
505 8 # |a 5. Discussion and future work -- Bibliography -- Authors' biographies. 
520 3 # |a This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered. Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors. Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. 
588 0 # |a Online resource; title from PDF title page (Morgan & Claypool; viewed on October 17, 2013). 
650 # 0 |a Information retrieval. 
650 # 0 |a Database security. 
650 # 0 |a Confidential communications. 
650 # 4 |a Computer networks  |x Security measures. 
650 # 4 |a Computer security. 
650 # 4 |a Information retrieval. 
650 # 4 |a Web databases. 
650 # 7 |a LANGUAGE ARTS & DISCIPLINES  |x General.  |x Library & Information Science  |2 bisacsh 
650 # 7 |a Confidential communications.  |0 (OCoLC)fst00874701  |2 fast 
650 # 7 |a Database security.  |0 (OCoLC)fst00888063  |2 fast 
650 # 7 |a Information retrieval.  |0 (OCoLC)fst00972619  |2 fast 
653 # # |a private information retrieval 
653 # # |a oblivious transfer 
653 # # |a homomorphic encryption 
653 # # |a private data warehouse queries 
653 # # |a private location-based queries 
655 # 4 |a Electronic books. 
655 # 0 |a Electronic books. 
700 1 # |a Paulet, Russell,  |e author. 
700 1 # |a Bertino, Elisa,  |e author. 
776 0 8 |a Yi, Xun.  |d San Rafael : Morgan & Claypool, 2013  |i Print version:  |t Private information retrieval.  |w (OCoLC)847941552  |z 1627051538 
830 # 0 |a Synthesis lectures on information security, privacy and trust ;  |v #5.  |x 1945-9742 
856 4 0 |u https://ezaccess.library.uitm.edu.my/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=646835  |z View fulltext via EzAccess 
938 # # |a EBL - Ebook Library  |b EBLB  |n EBL1441170 
938 # # |a ebrary  |b EBRY  |n ebr10775373 
938 # # |a EBSCOhost  |b EBSC  |n 646835 
938 # # |a YBP Library Services  |b YANK  |n 11210044