期刊文献+

基于可信计算的PIR 被引量:2

PIR Based on Trusted Computation
下载PDF
导出
摘要 介绍了私有信息获取和可信计算的概念,由此引出了基于可信计算PIR的概念并列举了几种现有模型及其性能,并为进一步提高PIR的性能提出了一种新的模型,该模型可以把安全处理器(SC)读写数据库的时间复杂度从O(N3/2)降低到O(cN),其中c是大于1的常数。 This article introduces the main concept of private information retrieval, trusted computation and the concept of PIR based on TC. It also gives some existing model of PIR based on TC and performance, and finally creates a new model in order to further improve SC's complexity of creating a shuffled database from O(N^3/2) to O(cN), where c is a constant greater than I.
出处 《计算机工程》 CAS CSCD 北大核心 2006年第24期141-143,共3页 Computer Engineering
关键词 私有信息获取 可信计算 安全处理器 Private infbrmation retrieval(PIR) Trusted computation(TC) Secure coprocessor(SC)
  • 相关文献

参考文献7

  • 1Chor B,Goldreich O,Kushilevitz E,et al.Private Information Retrieval[J].Journal of the ACM,1998,45(6):965-982.
  • 2Kushilevitz E,Ostrovsky R.Replication is not Needed:Single Database,Computationally-private Information Retrieval[C].Proceedings of the 38th Annual Symposium on Foundations of Computer Science,Florida,USA,1997-10:364-373.
  • 3Iliev A,Sean W.Protecting Client Privacy with Trusted Computing at the Server[J].Security & Privacy Magazine,2005,3(2):20-28.
  • 4Smith S W,Safford D.Practical Server Privacy with Secure Coprocessors[J].IBM System Journal,2001,40(3).
  • 5Asonov D,Freytag J C.Almost Optimal Private Information Retrieval[C].Proceedings of the 2nd Workshop on Privacy Enhancing Technologies,San Francisco,USA,2002-04.
  • 6Asonov D,Freytag J C.Private Information Retrieval,Optimal for Users and Secure Coprocessors[R].Humboldt Univ,Tech.Rep.O:HUB-IB-159,2002.
  • 7李广彪,张剑云.伪随机序列及其在加密系统中的应用[J].电子测量与仪器学报,2004,18(z2):751-755. 被引量:2

共引文献1

同被引文献16

  • 1罗永龙,黄刘生,荆巍巍,姚亦飞,陈国良.一个保护私有信息的布尔关联规则挖掘算法[J].电子学报,2005,33(5):900-903. 被引量:33
  • 2罗永龙,黄刘生,荆巍巍,徐维江.空间几何对象相对位置判定中的私有信息保护[J].计算机研究与发展,2006,43(3):410-416. 被引量:44
  • 3祁堃,黄刘生,罗永龙,荆巍巍.一种高效的私有信息检索方案[J].小型微型计算机系统,2007,28(7):1185-1188. 被引量:2
  • 4Monica Scannapieco,Ilya Figotin.Privacy preserving schema and data matching[C].Beijing,China:SIGMOD,2007.
  • 5Iliev A,Scan W.Protecting client privacy with trusted computing at the server[J].Security & Privacy Magazine,2005,3(2):20-28.
  • 6Kantarcioglu M,Clifton C.Privacy-preserving distributed mining of association rules on horizontally partitioned data[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(9):1026-1037.
  • 7Rakesh Agrawal,Alexandre Evfimievski,Ramakrishnan Srikant.Information sharing across private databascs[C].San Diego,CA:SIGMOD,2003.
  • 8Chor B, Goldreich O, Kushilevitz E, et al. Private Information Retrieval[J]. Journal of the ACM, 1998, 45(6): 965-982.
  • 9Smith S W, Safford D. Practical Server Privacy with Secure Coprocessors[J]. IBM Systems Journal, 2001, 40(3): 683-695.
  • 10Asonov D, Freytag J C. Private Information Retrieval, Optimal for Users and Secure Coprocessors[R]. Berlin, Germany: Humboldt University, Tech. Rep.: HUB-IB-159, 2002.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部