More robust private information retrieval scheme

被引:0
作者
Chen, Chun-Hua [1 ,2 ]
Horng, Gwoboa [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[2] Chien Kuo Technol Univ, Dept Elect Engn, Changhua, Taiwan
来源
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2006年
关键词
private information retrieval (PIR); mutual authentication; DSA algorithm; secure coprocessor (SC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In e-commerce, the protection of users' privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated and solved. A PIR scheme allows a user to retrieve a data item from an online database while hiding the identity of the item from a database server. In this paper, a new PIR scheme using a secure coprocessor (SC) and including mutual authentication by DSA signature algorithm for protecting the privacy of users, is proposed. Because of using only one server and including the mutual authentication process in the proposed scheme, it is more efficient and more robust (secure) in the real e-commerce environment compared with previous PIR solutions. In addition, a security analysis (proof) for the proposed scheme and comparisons to other PIR schemes are given.
引用
收藏
页码:297 / +
页数:2
相关论文
共 50 条
  • [31] Security analysis and Improvement of a Privacy Authentication Scheme for Telecare Medical Information Systems
    Fan Wu
    Lili Xu
    Journal of Medical Systems, 2013, 37
  • [32] Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography
    Farash, Mohammad Sabzinejad
    Kumari, Saru
    Bakhtiari, Majid
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4485 - 4504
  • [33] A Lightweight Anonymous Device Authentication Scheme for Information-Centric Distribution Feeder Microgrid
    Xiang, Anhao
    Zheng, Jun
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (02): : 2141 - 2158
  • [34] Robust Secure Dynamic ID Based Remote User Authentication Scheme for Multi-server Environment
    Toan-Thinh Truong
    Minh-Triet Tran
    Anh-Duc Duong
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT V, 2013, 7975 : 502 - 515
  • [35] A robust authentication scheme for remote diagnosis and maintenance in 5G V2N
    Ma, Ruhui
    Cao, Jin
    Feng, Dengguo
    Li, Hui
    Li, Xiaowei
    Xu, Yang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 198
  • [36] A robust and efficient dynamic identity-based multi-server authentication scheme using smart cards
    Chang, Chin-Chen
    Cheng, Ting-Fang
    Hsueh, Wei-Yuan
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (02) : 290 - 306
  • [37] A Robust Biometric-Based Authentication Scheme for Wireless Body Area Network Using Elliptic Curve Cryptosystem
    Sarvabhatla, Mrudula
    Reddy, M. Chandra Mouli
    Vorugunti, Chandra Sekhar
    PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 582 - 587
  • [38] A robust and secure user authentication scheme based on multifactor and multi-gateway in IoT enabled sensor networks
    Kumar, Ravi
    Singh, Samayveer
    Singh, Deepti
    Kumar, Mohit
    Gill, Sukhpal Singh
    SECURITY AND PRIVACY, 2024, 7 (01)
  • [39] A Secure and Robust Smartcard-Based Authentication Scheme for Session Initiation Protocol Using Elliptic Curve Cryptography
    Mishra, Dheerendra
    Das, Ashok Kumar
    Mukhopadhyay, Sourav
    Wazid, Mohammad
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 91 (03) : 1361 - 1391
  • [40] A Dynamic ID-based Authentication Scheme based on ECC for Telecare Medicine Information Systems
    Xu, Xin
    Jin, Zheng-Ping
    Zhang, Hua
    Zhu, Ping
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 861 - 866