Atjaunināt sīkdatņu piekrišanu

Private Information Retrieval [Mīkstie vāki]

Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 59,85 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
Citas grāmatas par šo tēmu:
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server.The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user retrieves information from multiple database servers, each of which has a copy of the same database. To ensure user privacy in the multi-server setting, the servers must be trusted not to collude. In 1997, Kushilevitz and Ostrovsky constructed the first single-database PIR. Since then, many efficient PIR solutions have been discovered.Beginning with a thorough survey of single-database PIR techniques, this text focuses on the latest technologies and applications in the field of PIR. The main categories are illustrated with recently proposed PIR-based solutions by the authors.Because of the latest treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy.Table of Contents: Preface / Acknowledgments / Classic Private Information Retrieval / FHE-Based Private Information Retrieval / Private Data Warehouse Queries / Privacy-Preserving Location-Based Queries / Discussion and Future Work / Bibliography / Authors' Biographies
Preface xi
Acknowledgments xv
1 Classic Private Information Retrieval
1(18)
1.1 Introduction
1(2)
1.2 Security Model for Private Information Retrieval
3(1)
1.3 Private Information Retrieval Protocols
4(6)
1.3.1 Kushilevitz-Ostrovsky PIR Protocol
4(2)
1.3.2 Chang PIR Protocol
6(2)
1.3.3 Gentry-Razman PIR Protocol
8(2)
1.4 Security Model for Oblivious Transfer
10(1)
1.5 Oblivious Transfer Protocols
11(5)
1.5.1 Even-Goldreich-Lempel OT21 Protocol
11(2)
1.5.2 Naor-Pinkas OTn1 Protocol
13(1)
1.5.3 Naor-Pinkas OTnk x 1 Protocol
14(2)
1.6 Relationship between PIR and OT
16(1)
1.7 Conclusion
17(2)
2 FHE-Based Private Information Retrieval
19(18)
2.1 Introduction
19(2)
2.2 Fully Homomorphic Encryption
21(2)
2.2.1 FHE Definition
21(1)
2.2.2 DGHV Somewhat Scheme
22(1)
2.3 Generic Single-Database PIR from FHE
23(4)
2.3.1 Response Generation Circuit
23(1)
2.3.2 Generic Single-Database PIR from FHE
24(2)
2.3.3 Generic Single-Database PBR from FHE
26(1)
2.4 Practical Single-Database PIR from FHE
27(3)
2.4.1 A Variant of DGHV Somewhat Scheme
27(1)
2.4.2 Practical Single-Database PBR from V-DGHV Scheme
28(2)
2.5 Security Analysis
30(1)
2.6 Performance Analysis
31(4)
2.6.1 Theoretic Performance Analysis
31(1)
2.6.2 Experiment
32(1)
2.6.3 Comparison
33(2)
2.7 Conclusion
35(2)
3 Private Data Warehouse Queries
37(26)
3.1 Introduction
37(3)
3.2 Boneh-Goh-Nissim Cryptosystem
40(2)
3.2.1 Bilinear Group
41(1)
3.2.2 Boneh-Goh-Nissim Encryption Scheme
41(1)
3.2.3 Homomorphic Properties
42(1)
3.3 Private Data Warehouse Queries
42(8)
3.3.1 Model
42(3)
3.3.2 Private Cell Retrieval
45(2)
3.3.3 Private OLAP Operations
47(1)
3.3.4 Private Statistical Analysis
48(2)
3.4 Security and Performance Analysis
50(4)
3.4.1 Security Analysis
50(1)
3.4.2 Performance Analysis
51(3)
3.5 Experimental Evaluation
54(6)
3.6 Conclusion
60(3)
4 Privacy-Preserving Location-Based Queries
63(20)
4.1 Introduction
63(3)
4.2 Model
66(3)
4.2.1 Notations
66(1)
4.2.2 System Model
66(1)
4.2.3 Security Model
67(2)
4.3 Privacy-Preserving Location-Based Query
69(6)
4.3.1 Protocol Summary
69(2)
4.3.2 Initialization
71(1)
4.3.3 Oblivious Transfer Phase
72(2)
4.3.4 Private Information Retrieval Phase
74(1)
4.4 Security Analysis
75(1)
4.4.1 Client's Security
75(1)
4.4.2 Server's Security
76(1)
4.5 Performance Analysis
76(3)
4.5.1 Computation
76(2)
4.5.2 Communication
78(1)
4.6 Experimental Evaluation
79(1)
4.6.1 Experimental Parameters
79(1)
4.6.2 Experimental Results
80(1)
4.7 Conclusion
80(3)
5 Discussion and Future Work
83(4)
Bibliography 87(10)
Authors' Biographies 97