Private information retrieval /

This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service prov...

Full description

Bibliographic Details
Main Authors: Yi, Xun (College teacher), (Author), Paulet, Russell, (Author), Bertino, Elisa, (Author)
Format: eBook
Language:English
Published: [San Rafael, California] : Morgan & Claypool Publishers, [2013]
Series:Synthesis lectures on information security, privacy and trust ; #5.
Subjects:
Online Access:View fulltext via EzAccess
Table of Contents:
  • 1. Classic private information retrieval
  • 1.1 Introduction
  • 1.2 Security model for private information retrieval
  • 1.3 Private information retrieval protocols
  • 1.3.1 Kushilevitz-Ostrovsky PIR protocol
  • 1.3.2 Chang PIR protocol
  • 1.3.3 Gentry-Razman PIR protocol
  • 1.4 Security model for oblivious transfer
  • 1.5 Oblivious transfer protocols
  • 1.5.1 Even-Goldreich-Lempel OT12 protocol
  • 1.5.2 Naor-Pinkas OTn1 protocol
  • 1.5.3 Naor-Pinkas OTnkx1 protocol
  • 1.6 Relationship between PIR and OT
  • 1.7 Conclusion.
  • 2. FHE-based private information retrieval
  • 2.1 Introduction
  • 2.2 Fully homomorphic encryption
  • 2.2.1 FHE definition
  • 2.2.2 DGHV somewhat scheme
  • 2.3 Generic single-database PIR from FHE
  • 2.3.1 Response generation circuit
  • 2.3.2 Generic single-database PIR from FHE
  • 2.3.3 Generic single-database PBR from FHE
  • 2.4 Practical single-database PIR from FHE
  • 2.4.1 A variant of DGHV somewhat scheme
  • 2.4.2 Practical single-database PBR from V-DGHV scheme
  • 2.5 Security analysis
  • 2.6 Performance analysis
  • 2.6.1 Theoretic performance analysis
  • 2.6.2 Experiment
  • 2.6.3 Comparison
  • 2.7 Conclusion.
  • 3. Private data warehouse queries
  • 3.1 Introduction
  • 3.2 Boneh-Goh-Nissim cryptosystem
  • 3.2.1 Bilinear group
  • 3.2.2 Boneh-Goh-Nissim encryption scheme
  • 3.2.3 Homomorphic properties
  • 3.3 Private data warehouse queries
  • 3.3.1 Model
  • 3.3.2 Private cell retrieval
  • 3.3.3 Private OLAP operations
  • 3.3.4 Private statistical analysis
  • 3.4 Security and performance analysis
  • 3.4.1 Security analysis
  • 3.4.2 Performance analysis
  • 3.5 Experimental evaluation
  • 3.6 Conclusion.
  • 4. Privacy-preserving location-based queries
  • 4.1 Introduction
  • 4.2 Model
  • 4.2.1 Notations
  • 4.2.2 System model
  • 4.2.3 Security model
  • 4.3 Privacy-preserving location-based query
  • 4.3.1 Protocol summary
  • 4.3.2 Initialization
  • 4.3.3 Oblivious transfer phase
  • 4.3.4 Private information retrieval phase
  • 4.4 Security analysis
  • 4.4.1 Client's security
  • 4.4.2 Server's security
  • 4.5 Performance analysis
  • 4.5.1 Computation
  • 4.5.2 Communication
  • 4.6 Experimental evaluation
  • 4.6.1 Experimental parameters
  • 4.6.2 Experimental results
  • 4.7 Conclusion.
  • 5. Discussion and future work
  • Bibliography
  • Authors' biographies.