Corpus ID: 6219627

Efficient Private Information Retrieval Using Secure Hardware

@inproceedings{Yu2013EfficientPI,
  title={Efficient Private Information Retrieval Using Secure Hardware},
  author={Xiangyao Yu and Christopher W. Fletcher and Ling Ren and Marten van Dijk and S. Devadas},
  year={2013}
}
Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can perform, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to trust that the query program will not leak information about the user query. We introduce Stream-Ascend in this paper, a processor that executes… Expand
3 Citations

Figures and Tables from this paper

References

SHOWING 1-10 OF 38 REFERENCES
Design space exploration and optimization of path oblivious RAM in secure processors
  • 122
  • PDF
Private Information Retrieval Using Trusted Hardware
  • 91
  • PDF
Toward Practical Private Access to Data Centers via Parallel ORAM
  • 24
  • PDF
Practical Private Information Retrieval with Secure Coprocessors
  • 37
New Techniques for Private Stream Searching
  • 76
  • PDF
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality
  • 241
  • PDF
Compilation Techniques for Efficient Encrypted Computation
  • 12
  • PDF
A secure processor architecture for encrypted computation on untrusted programs
  • 176
  • PDF
Private Searching on Streaming Data
  • 200
  • PDF
ON DATA BANKS AND PRIVACY HOMOMORPHISMS
  • 1,615
  • Highly Influential
  • PDF
...
1
2
3
4
...