计算机应用 ›› 2017, Vol. 37 ›› Issue (2): 494-498.DOI: 10.11772/j.issn.1001-9081.2017.02.0494

• 网络空间安全 • 上一篇    下一篇

基于点函数秘密共享的私有信息检索协议

袁大曾1,2, 何明星2, 李虓1, 曾晟珂2   

  1. 1. 西华大学 理学院, 成都 610039;
    2. 西华大学 计算机与软件工程学院, 成都 610039
  • 收稿日期:2016-08-10 修回日期:2016-09-09 出版日期:2017-02-10 发布日期:2017-02-11
  • 通讯作者: 袁大曾,yuan_dz34@163.com
  • 作者简介:袁大曾(1992-),女,四川达州人,硕士研究生,CCF会员,主要研究方向:安全协议、网络安全、大数据;何明星(1964-),男,四川南江人,教授,博士,CCF会员,主要研究方向:现代密码算法、安全协议、密钥管理、电子商务/电子政务安全;李虓(1972-),男,四川达州人,副教授,博士,CCF会员,主要研究方向:信息安全、密码学;曾晟珂(1982-),女,重庆人,副教授,博士,CCF会员,主要研究方向:信息安全、密码学。
  • 基金资助:
    国家自然科学基金资助项目(U1433130);教育部春晖计划项目(Z2014045)。

Private information retrieval protocol based on point function secret sharing

YUAN Dazeng1,2, HE Mingxing2, LI Xiao1, ZENG Shengke2   

  1. 1. School of Science, Xihua University, Chengdu Sichuan 610039, China;
    2. School of Computer and Software Engineering, Xihua University, Chengdu Sichuan 610039, China
  • Received:2016-08-10 Revised:2016-09-09 Online:2017-02-10 Published:2017-02-11
  • Supported by:
    This work is partially supported by the National Natural Science Foundation of China (U1433130), the Ministry Basic Research Program (Chunhui Program) of China (Z2014045).

摘要: 针对私有信息检索(PIR)中的隐私安全问题,提出了一个基于点函数秘密共享的私有信息检索协议。该协议将检索的索引看成一个特殊的0-1点函数,利用点函数秘密共享技术生成这个点函数的密钥组,分别发送给p个服务器,根据p个服务器返回的响应作异或运算得到检索结果。对协议进行了正确性、安全性和效率分析,验证了这个协议是安全且高效的,并给出了一个具体实例来说明该协议的有效性。最后介绍了将该协议推广到多项私有信息检索和基于关键字的私有信息检索中的应用情况。

关键词: 点函数, 函数秘密共享, 私有信息检索, 隐私安全, 异或运算

Abstract: Focusing on the privacy security problem of Private Information Retrieval (PIR), a private information retrieval protocol based on point Function Secret Sharing (FSS) was proposed. The index of the retrieval was regarded as a special 0-1 point function, and the key group of the point function was generated by using the point function secret sharing technique, which was sent to p servers respectively. The retrieval results were obtained by XOR operation according to the responses returned by the p servers. The correctness, security and efficiency of the protocol were analyzed, which proves that the proposed protocol is secure and efficient. A concrete example was given to illustrate the validity of the protocol. Finally, the applications of the protocol to multi-term private information retrieval and keyword-based private information retrieval were introduced.

Key words: point function, Function Secret Sharing (FSS), Private Information Retrieval (PIR), privacy security, XOR operation

中图分类号: