期刊文献+

多服务器环境下的隐私信息检索 被引量:1

Private Information Retrieval under Multi-server Environment
原文传递
导出
摘要 隐私信息检索(PIR)是为了保障个人隐私在公共网络平台上的私密性而采用的一种阻止数据库知晓用户查询信息的策略。通过研究已经被提出的PIR方案,分析其优缺点,试图探求一种能够综合考虑多方面安全性的可行PIR方案模型。文章采用Shamir秘密共享协议、乘法同态加密和其他相关的技术,结合当前网络环境的复杂性,并考虑可能存在的对用户检索信息的恶意攻击,设计了一种基于多服务器的隐私信息检索方案。 Private information retrieval(PIR) is a strategy to protect individual privacy on the puhlic network platform and prevent database from knowing user's query information. The formerly proposed PIR schemes and their merits and demerits are studied and analyzed, and a feasible PIR model in considering various safeties is explored. With these, Shamir secret-sharing protocol, multiplication homomorphism encryption and other technologies are employed, and a proper PIR scheme based on multiple servers is designed in consideration of the current complicated network environment and hostile attack to user's query information.
出处 《信息安全与通信保密》 2011年第12期100-102,共3页 Information Security and Communications Privacy
基金 国家自然科学基金资助项目(批准号:60803146)
关键词 隐私信息检索 秘密共享 乘法同态加密 PIR secret sharing multiplication homomorphism encryption
  • 相关文献

参考文献7

  • 1CHOR B, GOLDREICH O, KUSHILEVITZ E, et al. Private Information Retrieval[C]//Proceedings of the 36th Annual Symposium on the Foundations of Computer Science. California, United States: IEEE Computer Society Press, 1995: 41-50.
  • 2BEIMEL A, ISHAI Y, MALKIN T. Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing[C]//Springer. CRYPTO 2000.Santa Barbara, USA: Springer-Verlag, 2000: 55-73.
  • 3AGUILARMELCHOR C, GABORIT P. A Lattice-Based Computationally-Efficient Private InformationRetrieval Protocol[C]//WEWORC 2007.Bochum, Germany: Cryptology Eprint Archive, 2007: 50-54.
  • 4GOLDBERG Ian. Improving the Robustness of Private Information Retrieval[C]//Proceeding of the 2007 IEEE Symposium on Security and Privacy. Washington, USA: IEEE Publications, 2007: 131-148.
  • 5马兰.阈下信道的安全性研究[J].信息安全与通信保密,2005,27(4):33-35. 被引量:1
  • 6BEIMEL A, STAHL Y. Robust Information-TheoreticPrivate Information Retrieval[C]//Proceedings of the 3rd International Conference on Security in Communication Networks. Berlin, Germany : Springer-Verlag, 2002 : 326-341.
  • 7章秉川,李斌兵.基于模糊门限的分布式数据存储系统[J].信息安全与通信保密,2010,7(8):76-78. 被引量:1

二级参考文献6

  • 1魏峰,张建中.一个完善的秘密分享方案[J].信息安全与通信保密,2006,28(1):64-65. 被引量:2
  • 2GOWDA T, VRUDHULA S. A Decomposition Based Approach for Synthesis of Multi-level Threshold Logic Circuits[C]// Proceedings of ASP-DAC. Seoul, Korea: IEEE Computer Society Press, 2008: 125-130.
  • 3SHAMIR A. How to Share A Secret[J]. Communications of the ACM, 1979, 24: 612-613.
  • 4BLAKLEY G. Safeguarding Cryptographic Keys[C]//Proceedings of National Computer Conference. Montvale, N J, USA: AFIPS Press, 1979: 313-317.
  • 5[美]STALLINGSWilliam.密码编码学与网络安全--原理与实践[M].孟庆树,王丽娜,傅建明,等,译.北京:电子工业出版社,2004:74-78.
  • 6杨伦标,高英仪.模糊数学原理及应用[M].广州:华南理工大学出版社,1995

同被引文献12

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部