Yacine Ichibane, Youssef Gahi, M. Guennoun, Z. Guennoun
{"title":"基于同态加密的私有信息检索方案性能分析","authors":"Yacine Ichibane, Youssef Gahi, M. Guennoun, Z. Guennoun","doi":"10.1109/ICTA.2015.7426877","DOIUrl":null,"url":null,"abstract":"Private Information Retrieval (PIR) is the fact that a client retrieves a certain record from a remote database managed by untrusted parties without letting them know which record has actually been requested, thus preserving the privacy of the client. Ostrovsky and Skeith showed in [1] that any homomorphic encryption can actually be used to achieve PIR. In this paper we use their protocol as basis to compare five well known homomorphic encryption schemes by providing simulation results.","PeriodicalId":375443,"journal":{"name":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","volume":"272 7","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Performance analysis of private information retrieval scheme based on homomorphic encryption\",\"authors\":\"Yacine Ichibane, Youssef Gahi, M. Guennoun, Z. Guennoun\",\"doi\":\"10.1109/ICTA.2015.7426877\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Private Information Retrieval (PIR) is the fact that a client retrieves a certain record from a remote database managed by untrusted parties without letting them know which record has actually been requested, thus preserving the privacy of the client. Ostrovsky and Skeith showed in [1] that any homomorphic encryption can actually be used to achieve PIR. In this paper we use their protocol as basis to compare five well known homomorphic encryption schemes by providing simulation results.\",\"PeriodicalId\":375443,\"journal\":{\"name\":\"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)\",\"volume\":\"272 7\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICTA.2015.7426877\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 5th International Conference on Information & Communication Technology and Accessibility (ICTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICTA.2015.7426877","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
私有信息检索(Private Information Retrieval, PIR)是指客户机从由不受信任的各方管理的远程数据库中检索某条记录,而不让它们知道实际请求了哪条记录,从而保护了客户机的隐私。Ostrovsky和Skeith在b[1]中表明,任何同态加密实际上都可以用来实现PIR。本文以其协议为基础,通过仿真结果对五种已知的同态加密方案进行了比较。
Performance analysis of private information retrieval scheme based on homomorphic encryption
Private Information Retrieval (PIR) is the fact that a client retrieves a certain record from a remote database managed by untrusted parties without letting them know which record has actually been requested, thus preserving the privacy of the client. Ostrovsky and Skeith showed in [1] that any homomorphic encryption can actually be used to achieve PIR. In this paper we use their protocol as basis to compare five well known homomorphic encryption schemes by providing simulation results.