- UsablePIR
NDSS'08,SanDiego,CA
NetworkSecurityandApplied CryptographyLaboratory
PeterWilliams petertw@cs.stonybrook.edu RaduSion sion@cs.stonybrook.edu http://crypto.cs.stonybrook.edu
UsablePIR NDSS'08,SanDiego,CA PeterWilliams - - PowerPoint PPT Presentation
NetworkSecurityandApplied CryptographyLaboratory http://crypto.cs.stonybrook.edu UsablePIR NDSS'08,SanDiego,CA PeterWilliams petertw@cs.stonybrook.edu RaduSion sion@cs.stonybrook.edu
NDSS'08,SanDiego,CA
NetworkSecurityandApplied CryptographyLaboratory
PeterWilliams petertw@cs.stonybrook.edu RaduSion sion@cs.stonybrook.edu http://crypto.cs.stonybrook.edu
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
/
Past:cPIRisimpractical
Sion&Carbunar@NDSS2007
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
Future:cPIRisimpractical
Sion&Carbunar@NDSS2007
(logarithmic)
Thewizardpredicts-
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
RAM CPU
Access Pattern Privacy Protocol Write Read Outsourced Data EncryptedDataBlock DataBlock
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
1
CanweuseORAM? Remote Un3trusted Server
Data ORAM
Trusted Party
ClientA ClientC ClientB PIR
MainIdea:ORAM+TrustedParty=PIR
Asonov,Smithandothers Makethispractical!
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
Level0:1bucket Level1:4buckets Level2:16buckets Level:/ buckets Query
ORAM:Ostrovsky,1996
Fake“bucketfiller” DataItem
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
2
ORAM:Levelfull?
Fake“bucketfiller” DataItem
ORAM:Ostrovsky,1996
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
b
sorting network ORAM:Ostrovsky,1996
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
server ORAM client
x
2
x
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
Smalllocalbuffer (read/writeprivacy) Download Bucket Discard Fakes Largeremotebuffer (noprivacy) UntrustedServer Client Encryptitems
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
server ORAM client
x
2
x
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
/
Mergesortonrandomkeys input:items, nomorefakes
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
Sort
Arraystosort remote> noreadprivacy smallbuffer local> readprivacy Output: real>timebuffersizes
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
server ORAM client
x
2
x
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
1
Addnewfakes
Smalllocalbuffer (read/writeprivacy) AddFakes&Re>encrypt Largeremotebuffer, sortedbybucket (noprivacy) UntrustedServer Client Divideinto buckets
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
( ) ( )
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
2
Existingwork
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab
UsablePrivateInformationRetrieval(NDSS2008)
StonyBrookNetworkSecurityandAppliedCryptographyLab