Detering Dishonest Behaviour in Private Information Retrieval

نویسنده

  • Casey Devet
چکیده

It is useful to support Byzantine robustness in a Private Information Retrieval (PIR) protocol so that any database operators that are being used cannot maliciously affect the records that a client is looking for. We analyze the problem of Byzantine servers in Goldberg’s IT-PIR protocol and relate the problem to the well known stag hunt game. To make this game more applicable, we expand it to include more than two agents, we define a multi-round game and incorporate the idea of punishing dishonest behaviour. Using the relationship between this problem and the that of collusion between PIR servers, we design a mechansim to deter servers from Byzantine behaviour.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Problems related to combinatorial configurations with applications to P2P-user private information retrieval

We explain the applications that combinatorial configurations have to peer-to-peer user-private information retrieval and we analyze some problems that arise from these applications. In particular we deal with the existence of combinatorial configurations, the characterization of optimal configurations for peer-to-peer user-private information retrieval and the existence of configurations preve...

متن کامل

Quantum Symmetrically-Private Information Retrieval

Private information retrieval systems (PIRs) allow a user to extract an item from a database that is replicated over k ≥ 1 servers, while satisfying various privacy constraints. We exhibit quantum k-server symmetrically-private information retrieval systems (QSPIRs) that use sublinear communication, do not use shared randomness among the servers, and preserve privacy against honest users and di...

متن کامل

Screening Ethics when Honest Agents Care about Fairness

We explore the potential for discriminating between honest and dishonest agents, when a principal faces an agent with private information about the circumstances of the exchange (good or bad). When honest agents reveal circumstances truthfully independently of the contract offered, the principal leaves a rent only to dishonest agents (even if honest agents are willing to lie about their ethics)...

متن کامل

Using (0, 1)-geometries for collusion-free P2P-user private information retrieval

Using (0, 1)-geometries for collusion-free P2P-user private information retrieval Maria Bras-Amorós, Klara Stokes, Marcus Greferath In the previous years some effort has been done for finding systems guaranteeing private information retrieval (PIR) in front of a data base or a search engine [2]. The aim is that the server owing the information to be retrieved should not learn what are the queri...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013