140 likes | 254 Views
On the Computational Practicality of Private Information Retrieval. Bogdan Carbunar Pervasive Platforms and Architectures Motorola Labs -By Nafia Malik . Radu Sion Network Security and Applied Cryptography Lab Computer Sciences, Stony Brook University. Motivation and Goal.
E N D
On the Computational Practicality of Private Information Retrieval BogdanCarbunarPervasive Platforms and Architectures Motorola Labs -By NafiaMalik. RaduSion • Network Security and Applied Cryptography Lab Computer Sciences, Stony Brook University
Motivation and Goal • PIR(Private Information Retrieval): primitive for accessing outsource data over a network, while preventing the storer to learn anything about client access pattern. • cPIR involves multiplication. • Multiplications is complex and requires higher computational running time. • Risks: increased running time->High prob(forward leakage.) • Scope: Single server cPIR.
Building Blocks • Hardware • Pentium 4 • Parallelism • MIPS • Fast Modular Arithmetic Algorithm • Quadratic Residuosity PIR • The cPIR algorithm • The boundary condition • Key size
Fast Modular Arithmetic Algorithm • Key size: • Highly efficient modular multiplication
Timeline • Past • 1995 to 2005 • Present • 2006 • Future • 2006 to 2035
Future • Moore’s Law: number of transistors on integrated circuit doubles every 18 month(Intel=> doubling processor MIPS every 2 year) • Nielsen’s Law: Highend network bandwidth grows at least by 50% per year.
Limitations of the Arguments • Symmetric PIR • l = log n key pairs, • n to transfer from PIR to SPIR • Client can retrieve one key out of every pair and unmask 1 out of n items. • Computation-Amortized PIR • Multi client computation • 2 way anonymization
Conclusions & Recommendations • Contributions: • Explore single server PIR for client privacy. • Empirical results for Past Present future. • Unrealistic example for PIR usefulness. • Recommendations : • Redesign protocol • Reshuffling instead of multiplications for efficiency.