Practical Private Information Retrieval with Secure Coprocessors

What does it take to implement a server that provides access to records in
a large database, in a way that ensures that the this access is completely
private---even to the operator of this server? In this paper, we abstract
this problem to a real world computer security application, and examine
the question: using current commercially available technology, is it
practical to build such a server, for real databases of realistic size,
that offers reasonable performance? We consider this problem in the light
of commercially available secure coprocessors---whose internal memory is
still much, much smaller than the typical database size---and construct an
algorithm that both provides asymptotically optimal performance, and also
promises reasonable performance in real implementations.

By: Sean W. Smith, Dave Safford

Published in: RC21806 in 2000

LIMITED DISTRIBUTION NOTICE:

This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.

rc21806.pdf

Questions about this service can be mailed to reports@us.ibm.com .