计算机工程 ›› 2012, Vol. 38 ›› Issue (20): 97-100.doi: 10.3969/j.issn.1000-3428.2012.20.025

• 安全技术 • 上一篇    下一篇

基于加密数据库的高效安全HW-PIR方案

花常琪,仲 红,石润华,李文娟   

  1. (安徽大学计算智能与信号处理教育部重点实验室,合肥 230039)
  • 收稿日期:2011-12-15 修回日期:2012-02-09 出版日期:2012-10-20 发布日期:2012-10-17
  • 作者简介:花常琪(1987-),女,硕士,主研方向:信息检索;仲 红,教授、博士生导师;石润华,副教授;李文娟,硕士
  • 基金项目:

    国家自然科学基金资助项目(61173188 , 61173187);安徽省自然科学基金资助项目(11040606M141)

Efficient and Secure HW-PIR Scheme Based on Encrypted Database

HUA Chang-qi, ZHONG Hong, SHI Run-hua, LI Wen-juan   

  1. (Key Laboratory of Intelligent Computing & Signal Processing of Ministry of Education, Anhui University, Hefei 230039, China)
  • Received:2011-12-15 Revised:2012-02-09 Online:2012-10-20 Published:2012-10-17

摘要: 在传统基于硬件的私有信息检索(HW-PIR)方案中,数据库明文记录容易被泄露。为解决该问题,提出基于加密数据库的HW-PIR方案。将数据库记录转化为(0,1)比特流后进行置换,并采用代理重加密算法,实现对密文数据库的查询,从而保证用户的查询隐私不会泄露给数据库服务器,还能防止用户的查询内容与数据库的隐私泄露给安全协处理器及恶意攻击者。效率分析结果表明,该方案的在线查询复杂度为O(1),同时安全处理器预处理阶段的计算量明显降低。

关键词: 私有信息检索, 安全协处理器, 代理重加密, 加密数据库, 比特流置换, 双线性映射群

Abstract: In traditional Hardware-based Private Information Retrieval(HW-PIR) scheme, the plaintext records in database are easy to be revealed. In order to solve the problem, this paper proposes a new HW-PIR scheme based on encrypted database. A permutation after the database records is converted into (0,1) bit stream, which is to inquire the ciphertext database by using the Proxy Re-cryptography(PRC) algorithm, so that the scheme not only can ensure the user’s privacy information not be leaked to the database server, but also can prevent inquires information of users and database privacy being revealed to secure coprocessor and malicious attacks, which is much more secure. Efficiency analysis result shows that the complexity in online inquires stage is O(1), and the computational cost of secure coprocessor in preprocess stage is decreased obviously.

Key words: Private Information Retrieval(PIR), Secure Coprocessor(SC), Proxy Re-cryptography(PRC), encrypted database, bit stream permutation, bilinear map groups

中图分类号: