An Efficient PIR Construction using Trusted Hardware
Conference Proceeding Article
For a private information retrieval (PIR) scheme to be deployed in practice, low communication complexity and low computation complexity are two fundamental requirements it must meet. Most existing PIR schemes only focus on the communication complexity. The reduction on the computational complexity did not receive the due treatment mainly because of its O(n) lower bound. By using the trusted hardware based model, we design a novel scheme which breaks this barrier. With constant storage, the computation complexity of our scheme, including offline computation, is linear to the number of queries and is bounded by after optimization.
Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18: Proceedings
City or Country
YANG, Yanjiang; DING, Xuhua; DENG, Robert H.; and BAO, Feng.
An Efficient PIR Construction using Trusted Hardware. (2008). Information Security: 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18: Proceedings. 5222, 64-79. Research Collection School Of Information Systems.
Available at: http://ink.library.smu.edu.sg/sis_research/430