Preface |
|
xi | |
Acknowledgments |
|
xv | |
|
1 Classic Private Information Retrieval |
|
|
1 | (18) |
|
|
1 | (2) |
|
1.2 Security Model for Private Information Retrieval |
|
|
3 | (1) |
|
1.3 Private Information Retrieval Protocols |
|
|
4 | (6) |
|
1.3.1 Kushilevitz-Ostrovsky PIR Protocol |
|
|
4 | (2) |
|
|
6 | (2) |
|
1.3.3 Gentry-Razman PIR Protocol |
|
|
8 | (2) |
|
1.4 Security Model for Oblivious Transfer |
|
|
10 | (1) |
|
1.5 Oblivious Transfer Protocols |
|
|
11 | (5) |
|
1.5.1 Even-Goldreich-Lempel OT21 Protocol |
|
|
11 | (2) |
|
1.5.2 Naor-Pinkas OTn1 Protocol |
|
|
13 | (1) |
|
1.5.3 Naor-Pinkas OTnk x 1 Protocol |
|
|
14 | (2) |
|
1.6 Relationship between PIR and OT |
|
|
16 | (1) |
|
|
17 | (2) |
|
2 FHE-Based Private Information Retrieval |
|
|
19 | (18) |
|
|
19 | (2) |
|
2.2 Fully Homomorphic Encryption |
|
|
21 | (2) |
|
|
21 | (1) |
|
2.2.2 DGHV Somewhat Scheme |
|
|
22 | (1) |
|
2.3 Generic Single-Database PIR from FHE |
|
|
23 | (4) |
|
2.3.1 Response Generation Circuit |
|
|
23 | (1) |
|
2.3.2 Generic Single-Database PIR from FHE |
|
|
24 | (2) |
|
2.3.3 Generic Single-Database PBR from FHE |
|
|
26 | (1) |
|
2.4 Practical Single-Database PIR from FHE |
|
|
27 | (3) |
|
2.4.1 A Variant of DGHV Somewhat Scheme |
|
|
27 | (1) |
|
2.4.2 Practical Single-Database PBR from V-DGHV Scheme |
|
|
28 | (2) |
|
|
30 | (1) |
|
|
31 | (4) |
|
2.6.1 Theoretic Performance Analysis |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (2) |
|
|
35 | (2) |
|
3 Private Data Warehouse Queries |
|
|
37 | (26) |
|
|
37 | (3) |
|
3.2 Boneh-Goh-Nissim Cryptosystem |
|
|
40 | (2) |
|
|
41 | (1) |
|
3.2.2 Boneh-Goh-Nissim Encryption Scheme |
|
|
41 | (1) |
|
3.2.3 Homomorphic Properties |
|
|
42 | (1) |
|
3.3 Private Data Warehouse Queries |
|
|
42 | (8) |
|
|
42 | (3) |
|
3.3.2 Private Cell Retrieval |
|
|
45 | (2) |
|
3.3.3 Private OLAP Operations |
|
|
47 | (1) |
|
3.3.4 Private Statistical Analysis |
|
|
48 | (2) |
|
3.4 Security and Performance Analysis |
|
|
50 | (4) |
|
|
50 | (1) |
|
3.4.2 Performance Analysis |
|
|
51 | (3) |
|
3.5 Experimental Evaluation |
|
|
54 | (6) |
|
|
60 | (3) |
|
4 Privacy-Preserving Location-Based Queries |
|
|
63 | (20) |
|
|
63 | (3) |
|
|
66 | (3) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (2) |
|
4.3 Privacy-Preserving Location-Based Query |
|
|
69 | (6) |
|
|
69 | (2) |
|
|
71 | (1) |
|
4.3.3 Oblivious Transfer Phase |
|
|
72 | (2) |
|
4.3.4 Private Information Retrieval Phase |
|
|
74 | (1) |
|
|
75 | (1) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (3) |
|
|
76 | (2) |
|
|
78 | (1) |
|
4.6 Experimental Evaluation |
|
|
79 | (1) |
|
4.6.1 Experimental Parameters |
|
|
79 | (1) |
|
4.6.2 Experimental Results |
|
|
80 | (1) |
|
|
80 | (3) |
|
5 Discussion and Future Work |
|
|
83 | (4) |
Bibliography |
|
87 | (10) |
Authors' Biographies |
|
97 | |