下載/瀏覽Download

Download Report

Transcript 下載/瀏覽Download

多媒體網路安全實驗室
Protecting the Privacy of Users in
e-Commerce Environment
Date:2010.10.27
Reporter:Chien-Wen Huang
Author:Chun-Hua Chen and Gwoboa Horng
出處:CCCT2004, Aug, 2004.
多媒體網路安全實驗室
Outline
1
2
3
INTRODUCTION
BASIC DEFINITION OF OS-PIR AND OUR OSPIR SCHEME
THEOREM AND PROOF
4 COMPARISONS TO OTHER PIR SCHEMES
5
CONCLUSIONS
2
多媒體網路安全實驗室
INTRODUCTION
Private Information Retrieval: PIR
 A user to keep his preferences private from
everybody including the server.
 EX:Patent Databases、Pharmaceutical Databases.
1.The first research of PIR was done by Chor et al. in
1995.(communication complexity:O(n1/k))
2.To improve the complexity, Chor et al. introduced
the notation of Computational PIR(CPIR)
3
多媒體網路安全實驗室
Private Information Retrieval
EX:使用者隨機選取S = {5,15,47} (假定n=10000 ,
index i = 15, S⊕i = {5,47})
4
多媒體網路安全實驗室
We propose a simple one-server PIR(OS-PIR)
scheme to provide privacy protection for online
users in e-commerce
1. The scheme is more practical than previous
PIR schemes in e-commerce environment.
2. The scheme has theoretical security to user
privacy.
5
多媒體網路安全實驗室
BASIC DEFINITION OF OS-PIR
AND OUR OS-PIR SCHEME
 i  [n]  {1,2,3,..., n}
n
 X  x1...xn  {0,1}
1. The user produces a query:Q (i ) to database server.
2. The database server responds A( X , Q(i ))
3. The user reconstructs the desired bit xi .(by
reconstruction function R(i, Q(i ), A( X , Q(i ))) )
Correctness: For every X {0,1}n , i  [n]
 R(i, Q(i), A( X , Q(i)))  xi
Privacy: For every i, j  [n]
 Pr(Q(i )  q )  Pr(Q ( j )  q )
6
多媒體網路安全實驗室
OS-PIR scheme(1)
1. The user randomly choose a small prime P1(e.g
19 or 101) and sends P1 to the database server. In
other words, Q (i )=P1.
2. The database server calculates and A( X , Q(i ))
sends it back to the user.
1)
2)
3)
a  P1 ( P1  Q(i))
For k=2 to n do
(a)Calculate the next bigger prime Pk
xk
(b) a  a * (Pk ) (xk is the value of k bit of X)
A( X , Q(i ))  a
7
多媒體網路安全實驗室
OS-PIR scheme(2)
3) The user reconstructs the desired bit xi
1) Calculate the Pi (the user knows P1 already)
2) If A( X , Q(i )) mod Pi =0
Then xi =1
Else xi=0
EX: The Database [0,1,0,0,1,0,0,1] ,and user
choose randam prime P1=19
1. P1= Q (i ) =19
2. a  19 * (P2  23) x2 * (P3  29) x3 * ...
3. a mod Pi  0(由1開始, 依序retrieve 0,1,0,0,...)
8
多媒體網路安全實驗室
THEOREM AND PROOF
Our scheme proposed is OS-PIR,has
information-theoretic security in the property of
privacy.
1. Match the form of the OS-PIR scheme.
2. the user and the database server can calculate
the value of Pi both.
3. Satisfy the property of privacy: Because the Q (i )
is P1, a small prime randomly chosen by user.
Pr(Q(i )  q )  Pr(Q( j )  q )
9
多媒體網路安全實驗室
COMPARISONS TO OTHER PIR
SCHEMES
10
多媒體網路安全實驗室
CONCLUSIONS
The OS-PIR scheme was proposed which has
practical feasibility and it can be easily
implemented.
It avoids the large management overheads of
multi-servers and has theoretical security to
users’ privacy.
11
多媒體網路安全實驗室