More robust private information retrieval scheme

被引:0
作者
Chen, Chun-Hua [1 ,2 ]
Horng, Gwoboa [1 ]
机构
[1] Natl Chung Hsing Univ, Inst Comp Sci, 250 Kuo Kuang Rd, Taichung 40227, Taiwan
[2] Chien Kuo Technol Univ, Dept Elect Engn, Changhua, Taiwan
来源
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2006年
关键词
private information retrieval (PIR); mutual authentication; DSA algorithm; secure coprocessor (SC);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In e-commerce, the protection of users' privacy from a server was not considered feasible until the private information retrieval (PIR) problem was stated and solved. A PIR scheme allows a user to retrieve a data item from an online database while hiding the identity of the item from a database server. In this paper, a new PIR scheme using a secure coprocessor (SC) and including mutual authentication by DSA signature algorithm for protecting the privacy of users, is proposed. Because of using only one server and including the mutual authentication process in the proposed scheme, it is more efficient and more robust (secure) in the real e-commerce environment compared with previous PIR solutions. In addition, a security analysis (proof) for the proposed scheme and comparisons to other PIR schemes are given.
引用
收藏
页码:297 / +
页数:2
相关论文
共 50 条
  • [41] REAS-TMIS: Resource-Efficient Authentication Scheme for Telecare Medical Information System
    Tanveer, Muhammad
    Khan, Abd Ullah
    Alkhayyat, Ahmed
    Chaudhry, Shehzad Ashraf
    Bin Zikria, Yousaf
    Kim, Sung Won
    [J]. IEEE ACCESS, 2022, 10 : 23008 - 23021
  • [42] A more secure and privacy-aware anonymous user authentication scheme for distributed mobile cloud computing environments
    Amin, Ruhul
    Islam, S. K. Hafizul
    Biswas, G. P.
    Giri, Debasis
    Khan, Muhammad Khurram
    Kumar, Neeraj
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (17) : 4650 - 4666
  • [43] A lightweight and robust two-factor authentication scheme for personalized healthcare systems using wireless medical sensor networks
    Wu, Fan
    Li, Xiong
    Sangaiah, Arun Kumar
    Xu, Lili
    Kumari, Saru
    Wu, Liuxi
    Shen, Jian
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 82 : 727 - 737
  • [45] A Secure Three Factor-Based Authentication Scheme for Telecare Medicine Information Systems With Privacy Preservation
    Chatterjee, Kakali
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [46] A More Efficient and Secure Untraceable Remote User Password Authentication Scheme Using Smart Card with Session Key Agreement
    Sahu, Ajay Kumar
    Kumar, Ashish
    [J]. COMPUTER COMMUNICATION, NETWORKING AND INTERNET SECURITY, 2017, 5 : 395 - 410
  • [47] Security and Efficiency Enhancement of Robust ID Based Mutual Authentication and Key Agreement Scheme Preserving User Anonymity in Mobile Networks
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (01) : 155 - 170
  • [48] A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
    Tian-Fu Lee
    I-Pin Chang
    Tsung-Hung Lin
    Ching-Cheng Wang
    [J]. Journal of Medical Systems, 2013, 37
  • [49] A Secure and Efficient Password-Based User Authentication Scheme Using Smart Cards for the Integrated EPR Information System
    Lee, Tian-Fu
    Chang, I-Pin
    Lin, Tsung-Hung
    Wang, Ching-Cheng
    [J]. JOURNAL OF MEDICAL SYSTEMS, 2013, 37 (03)
  • [50] An Improved and Effective Secure Password-Based Authentication and Key Agreement Scheme Using Smart Cards for the Telecare Medicine Information System
    Ashok Kumar Das
    Bezawada Bruhadeshwar
    [J]. Journal of Medical Systems, 2013, 37