An efficient PIR construction using trusted hardware

Y Yang, X Ding, RH Deng, F Bao - International Conference on …, 2008 - Springer
For a private information retrieval (PIR) scheme to be deployed in practice, low
communication complexity and low computation complexity are two fundamental
requirements it must meet. Most existing PIR schemes only focus on the communication
complexity. The reduction on the computational complexity did not receive the due treatment
mainly because of its O (n) lower bound. By using the trusted hardware based model, we
design a novel scheme which breaks this barrier. With constant storage, the computation …

[PDF][PDF] An Efficient PIR Construction using Trusted Hardware.(2008)

Y YANG, X DING, RH DENG… - Information Security: 11th …, 2008 - ink.library.smu.edu.sg
For a private information retrieval (PIR) scheme to be deployed in practice, low
communication complexity and low computation complexity are two fundamental
requirements it must meet. Most existing PIR schemes only focus on the communication
complexity. The reduction on the computational complexity did not receive the due treatment
mainly because of its O (n) lower bound. By using the trusted hardware based model, we
design a novel scheme which breaks this barrier. With constant storage, the computation …
顯示最佳搜尋結果。 查看所有結果