UsablePIR NDSS'08,SanDiego,CA PeterWilliams - - PowerPoint PPT Presentation

usable pir
SMART_READER_LITE
LIVE PREVIEW

UsablePIR NDSS'08,SanDiego,CA PeterWilliams - - PowerPoint PPT Presentation

NetworkSecurityandApplied CryptographyLaboratory http://crypto.cs.stonybrook.edu UsablePIR NDSS'08,SanDiego,CA PeterWilliams petertw@cs.stonybrook.edu RaduSion sion@cs.stonybrook.edu


slide-1
SLIDE 1
  • UsablePIR

NDSS'08,SanDiego,CA

NetworkSecurityandApplied CryptographyLaboratory

PeterWilliams petertw@cs.stonybrook.edu RaduSion sion@cs.stonybrook.edu http://crypto.cs.stonybrook.edu

slide-2
SLIDE 2

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Overview:PIR
slide-3
SLIDE 3

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • TypesofPIR
  • !"#$ "%
  • %&'("%

) *+,(+ ) --.',+"% ) -(+

slide-4
SLIDE 4

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

/

Past:cPIRisimpractical

Sion&Carbunar@NDSS2007

slide-5
SLIDE 5

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

Future:cPIRisimpractical

Sion&Carbunar@NDSS2007

(logarithmic)

Thewizardpredicts-

slide-6
SLIDE 6

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • “ObliviousRAM”

RAM CPU

Access Pattern Privacy Protocol Write Read Outsourced Data EncryptedDataBlock DataBlock

slide-7
SLIDE 7

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

1

CanweuseORAM? Remote Un3trusted Server

Data ORAM

Trusted Party

ClientA ClientC ClientB PIR

MainIdea:ORAM+TrustedParty=PIR

Asonov,Smithandothers Makethispractical!

slide-8
SLIDE 8

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • ORAMOverview

Level0:1bucket Level1:4buckets Level2:16buckets Level:/ buckets Query

ORAM:Ostrovsky,1996

Fake“bucketfiller” DataItem

slide-9
SLIDE 9

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

2

ORAM:Levelfull?

Fake“bucketfiller” DataItem

ORAM:Ostrovsky,1996

slide-10
SLIDE 10

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • ORAM:Howtore3shuffle?

b

sorting network ORAM:Ostrovsky,1996

slide-11
SLIDE 11

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Re3shuffle:faster?
  • un>trusted

server ORAM client

x

  • 1

2

  • 3

x

slide-12
SLIDE 12

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Removefakes

) (&3+( ) 4+5

Smalllocalbuffer (read/writeprivacy) Download Bucket Discard Fakes Largeremotebuffer (noprivacy) UntrustedServer Client Encryptitems

slide-13
SLIDE 13

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Re3shuffle:mergesort
  • un>trusted

server ORAM client

x

  • 1

2

  • 3

x

slide-14
SLIDE 14

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

/

Mergesortonrandomkeys input:items, nomorefakes

  • utput:sorted
  • ncryptohash
slide-15
SLIDE 15

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

Sort

) %54+&&,'+ ) 6#5.+'(7(3#'

Arraystosort remote> noreadprivacy smallbuffer local> readprivacy Output: real>timebuffersizes

slide-16
SLIDE 16

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Re3shuffle:addnewfakes
  • un>trusted

server ORAM client

x

  • 1

2

  • 3

x

slide-17
SLIDE 17

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

1

Addnewfakes

Smalllocalbuffer (read/writeprivacy) AddFakes&Re>encrypt Largeremotebuffer, sortedbybucket (noprivacy) UntrustedServer Client Divideinto buckets

slide-18
SLIDE 18

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Costs

) 8 (& ) 9 +&&(#/ (( ) +&&& ( ) '8(,:+#&+&&5 ) ;(,:+#5 < +(38=

( )

( ) ( )

( ) ( )

( )

  • /

/ /

∑ ∑

( )

( )

  • (

)

  • /

/

slide-19
SLIDE 19

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

2

Existingwork

>( ) ?(;3#;*22 ) -'%/ ) @A-;%.- ) ,(

( )

  • /
  • (

)

  • (

)

  • (

)

  • (

)

slide-20
SLIDE 20

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Howfastcanwerun?
slide-21
SLIDE 21

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Closingin<

Conclusions

PracticalPrivateInformationRetrievalProtocol Severalqueriespersecondoverlargedatasets Fullcomputationalprivacy

FutureWork

De>amortizere>shufflecosts Reduceserverstorageoverhead> eliminateuseoffakes Newmechanismwithoverhead

( )

slide-22
SLIDE 22

UsablePrivateInformationRetrieval(NDSS2008)

StonyBrookNetworkSecurityandAppliedCryptographyLab

  • Closingin<

Thankyou!