08.06.2015 Views

On the Practicality of PIR - Radu Sion

On the Practicality of PIR - Radu Sion

On the Practicality of PIR - Radu Sion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Trusted Hardware<br />

Stony Brook Network Security and Applied Cryptography Lab<br />

secure<br />

insert/update<br />

arbitrary<br />

private query<br />

Secure<br />

Memory<br />

encrypted query<br />

response<br />

data client<br />

Secure Co-<br />

Processor<br />

Host CPU<br />

Outsourced<br />

Data<br />

(encrypted)<br />

Server Storage<br />

encrypted item<br />

data management server<br />

A secure co-processor on <strong>the</strong> data<br />

management side may allow for significant<br />

leaps in expressivity for queries where privacy<br />

and completeness assurance are important.<br />

<strong>Practicality</strong> <strong>of</strong> Private Information Retrieval (NDSS, February 2006)<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!