On the Practicality of PIR - Radu Sion
On the Practicality of PIR - Radu Sion
On the Practicality of PIR - Radu Sion
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Protocol overview<br />
Stony Brook Network Security and Applied Cryptography Lab<br />
bit string d[n]<br />
3<br />
Π(v[i]*d[i]) = QNR ?<br />
yes<br />
d[i]=1<br />
Question d[i]=?<br />
QR 1<br />
QR 2<br />
QR 3<br />
.<br />
QR i-1<br />
QNR<br />
QR i+1<br />
.<br />
QR n-2<br />
QR n-1<br />
QR n<br />
v[i] 1<br />
Π(v[i]*d[i])<br />
Perform same<br />
protocol per<br />
column and<br />
look at returned<br />
product <strong>of</strong><br />
interest<br />
2<br />
x<br />
x<br />
x<br />
x<br />
x<br />
x<br />
x<br />
1<br />
2<br />
3<br />
n-2<br />
n-1<br />
n<br />
escape O(n) costs<br />
i<br />
n<br />
x<br />
x<br />
x<br />
x<br />
x<br />
n<br />
x<br />
x<br />
Π 1 Π 2<br />
... Π 3<br />
client<br />
server<br />
<strong>Practicality</strong> <strong>of</strong> Private Information Retrieval (NDSS, February 2006)<br />
6