Welcome to Journal of University of Chinese Academy of Sciences,Today is

›› 2011, Vol. 28 ›› Issue (3): 389-397.DOI: 10.7523/j.issn.2095-6134.2011.3.017

• Research Articles • Previous Articles     Next Articles

Σ-private private information retrieval protocols

ZHANG Zi-Kun, LV Ke-Wei   

  1. State Key Laboratory of Information Security, Graduate University, Chinese Academy of Sciences,Beijing 100049, China
  • Received:2010-06-07 Revised:2010-08-13 Online:2011-05-15

Abstract:

We pose the definition of Σ-private private information retrieval (PIR) protocol,and then construct a Σ-private PIR protocol based on verifiable secret sharing(VSS)scheme on general access structure . We also construct an efficient robust Σ-private PIR protocol based on robust multiplication protocol and the database is also secure. The corresponding communication complexity is dependent on the size of the access structure and is efficient for minority of servers.

Key words: private information retrieval protocol, verifiable secret sharing scheme, general access structure

CLC Number: