controlling data disclosure in computational pir protocols
文献类型:学位论文
作者 | Shang Ning ; Ghinita Gabriel ; Zhou Yongbin ; Bertino Elisa |
答辩日期 | 2010 |
关键词 | Cryptography Law enforcement |
出版地 | United States |
英文摘要 | Private Information Retrieval (PIR) protocols allow users to learn data items stored at a server which is not fully trusted, without disclosing to the server the particular data element retrieved. Several PIR protocols have been proposed, which provide strong guarantees on user privacy. Nevertheless, in many application scenarios it is important to protect the database as well. In this paper, we investigate the amount of data disclosed by the the most prominent PIR protocols during a single run. We show that a malicious user can stage attacks that allow an excessive amount of data to be retrieved from the server. Furthermore, this vulnerability can be exploited even if the client follows the legitimate steps of the PIR protocol, hence the malicious request can not be detected and rejected by the server. We devise mechanisms that limit the PIR disclosure to a single data item. © 2010 ACM. |
语种 | 英语 |
公开日期 | 2011-03-31 |
资助信息 | ACM SIGSAC |
页码 | 310-313 |
出处 | Proceedings of the 5th International Symposium on Information, Computer and Communications Security, ASIACCS 2010 |
收录类别 | EI |
源URL | [http://124.16.136.157/handle/311060/8708] ![]() |
专题 | 软件研究所_基础软件国家工程研究中心_学位论文 |
推荐引用方式 GB/T 7714 | Shang Ning,Ghinita Gabriel,Zhou Yongbin,et al. controlling data disclosure in computational pir protocols[D]. 2010. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。