Summary: | 碩士 === 南台科技大學 === 資訊工程系 === 99 === Following rapid development of network technology, people desire to acquire more useful and important knowledge from Internet gradually. In general, user will reveal his request message for innate character while processing his query. Thus, it will let the administrator of database be aware of user’s intention. For overcoming the flaw, we introduce the concept of PIR – Private Information Retrieval to improve the private leakage issue.
Past PIR mechanism may prevent the user’s request from being known by server, but it cannot resist the reveal of request message due to malicious attack, for example, Man-in-the-middle attack. For that, the paper adopts RSA and ECC to propose four schemes respectively. Our schemes are satisfied with PIR’s requirements – validity and privacy. In addition, for resisting forgery attack, we suggest a new verification for PIR, in which ECC pairing is adopted to reduce the computation cost for verification.
Besides, we also analyze the adaption and security of the four schemes for various environments.
|