On the Practicality of PIR - Radu Sion
On the Practicality of PIR - Radu Sion
On the Practicality of PIR - Radu Sion
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Trusted Hardware<br />
Stony Brook Network Security and Applied Cryptography Lab<br />
secure<br />
insert/update<br />
arbitrary<br />
private query<br />
Secure<br />
Memory<br />
encrypted query<br />
response<br />
data client<br />
Secure Co-<br />
Processor<br />
Host CPU<br />
Outsourced<br />
Data<br />
(encrypted)<br />
Server Storage<br />
encrypted item<br />
data management server<br />
A secure co-processor on <strong>the</strong> data<br />
management side may allow for significant<br />
leaps in expressivity for queries where privacy<br />
and completeness assurance are important.<br />
<strong>Practicality</strong> <strong>of</strong> Private Information Retrieval (NDSS, February 2006)<br />
20