Private Information Storage with Logarithm-Space Secure Hardware

نویسندگان

  • Alexander Iliev
  • Sean W. Smith
چکیده

In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent research in “practical PIR” has limited the players to the user and server and limited the user’s work to negotiating a session key (eg. as in SSL)— but then added a secure coprocessor to the server and required the secure coprocessor to encrypt/permute the dataset (and often gone ahead and built real systems). Practical PIR (PPIR) thus consists of trying to solve a privacy problem for a large dataset using the small internal space of the coprocessor. This task is very similar to the one undertaken by the older Oblivious RAMs work, and indeed the latest PPIR work uses techniques developed for Oblivious RAMs. Previous PPIR work had two limitations: the internal space required was still O(N lg N) bits, and records could only be read privately, not written. In this paper, we present a design and experimental results that overcome these limitations. We reduce the internal memory to O(lg N) by basing the pseudorandom permutation on a Luby-Rackoff style block cipher, and by redesigning the oblivious shuffle to reduce space requirements and avoid unnecessary work. This redesign yields both a time and a space savings. These changes expand the system’s applicability to larger datasets and domains such as private file storage. These results have been implemented for the IBM 4758 secure coprocessor platform, and are available for download.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure FPGA Design by Filling Unused Spaces

Nowadays there are different kinds of attacks on Field Programmable Gate Array (FPGA). As FPGAs are used in many different applications, its security becomes an important concern, especially in Internet of Things (IoT) applications. Hardware Trojan Horse (HTH) insertion is one of the major security threats that can be implemented in unused space of the FPGA. This unused space is unavoidable to ...

متن کامل

Private Information Storage with Logarithmic-space Secure Hardware

In Private Information Retrieval (PIR), a user obtains one of N records from a server, without the server learning what record was requested. Recent research in “practical PIR” has limited the players to the user and server and limited the user’s work to negotiating a session key (eg. as in SSL)— but then added a secure coprocessor to the server and required the secure coprocessor to encrypt/pe...

متن کامل

Fuzzy retrieval of encrypted data by multi-purpose data-structures

The growing amount of information that has arisen from emerging technologies has caused organizations to face challenges in maintaining and managing their information. Expanding hardware, human resources, outsourcing data management, and maintenance an external organization in the form of cloud storage services, are two common approaches to overcome these challenges; The first approach costs of...

متن کامل

The discrete logarithm problem for elliptic curves over binary fields: analysis and experiments

Cryptographic applications play a significant role in secure and private communication of information. Secrecy and security in areas such as military intelligence are of paramount importance. Many of the modern day cryptographic algorithms are deemed to be secure, based on the intractability of the discrete logarithm problem over the elliptic curves defined in Galois fields. The purpose of this...

متن کامل

Hardware and Software Symbiosis Helps Smart Card Evolution

The need to manage and secure a rapidly growing information network has focused increasing attention on smart card technology. Over the past decade, smart cards evolved from offering basic memory to complex systems with chips that incorporate powerful processing units with dedicated peripherals. This evolution enabled a wide range of applications. Smart card applications include financial trans...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004