TAILIEUCHUNG - Replication Is Not Needed: Single Database, Computationally-Private Information Retrieval

Designers still have the option of three-tier or n-tier application designs; but, they now have the two-tier option again. The sim- plicity of two-tier client/server is attractive, but security issues (databases have huge attack surfaces) may cause many designers to want three-tier server architectures with the web server in the demilitarized zone (DMZ). It is likely that web services will be the way we federate heteroge- neous database systems. . | Replication Is Not Needed Single Database Computationally-Private Information Retrieval extended abstract Eyal Kushilevitz Technion Rafail Ostrovskyt Bellcore Abstract We establish the following quite unexpected result replication of data for the computational Private Information Retrieval problem is not necessary. More specifically based on the quadratic resid-uosity assumption we present a single database computationally-private information-retrieval scheme with O ne communication complexity for any e 0. 1 Introduction Problem statement and History Private Information Retrieval PIR schemes allow a user to retrieve information from a database while maintaining the privacy of the queries from the database. More formally we view the data as an n-bit string X from which the user wishes to obtain the bit Xi while keeping the index i private from the database. The notion of PIR schemes was introduced by Chor Goldreich Kushilevitz and Sudan CGKS-95 in an information theoretic setting. This Dept. of Computer Science Technion Haifa Israel email eyalk@ http evalk Part of this research was done while visiting DIMACS center at Rutgers University. Supported by MANLAM Fund 120-857 and by the Fund for Promotion of Research at the Technion. ÍBell Communications Research MCC 1C-365B 445 South Street Morristown New Jersey 07960-6438. e-mail rafail@. means that the queries asked by the user give no information whatsoever about i. In this setting they proved the following results Every information theoretic PIR scheme with a single-database requires Q n bits of communication this matches the trivial upper bound in which the user just asks for a copy of the entire database in order to hide which particular bit it is interested in . A way to get around the above impossibility result so as to reduce the communication complexity to be sub-linear in n is by assuming that the data is replicated in several sites which are assumed not .

TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.