{"_id":"QzCuockKJuzFg5P2B","bibbaseid":"patterson-sassaman-subliminalchannelsintheprivateinformationretrievalprotocols-2007","downloads":0,"creationDate":"2018-07-03T04:50:28.284Z","title":"Subliminal Channels in the Private Information Retrieval Protocols","author_short":["Patterson, M. L.","Sassaman, L."],"year":2007,"bibtype":"conference","biburl":"https://gnunet.org/bibliography/export/bibtex","bibdata":{"bibtype":"conference","type":"conference","title":"Subliminal Channels in the Private Information Retrieval Protocols","booktitle":"Proceedings of the 28th Symposium on Information Theory in the Benelux","year":"2007","publisher":"Werkgemeenschap voor Informatie- en Communicatietheorie","organization":"Werkgemeenschap voor Informatie- en Communicatietheorie","address":"Enschede,NL","abstract":"Information-theoretic private information retrieval (PIR) protocols, such as those described by Chor et al. [5], provide a mechanism by which users can retrieve information from a database distributed across multiple servers in such a way that neither the servers nor an outside observer can determine the contents of the data being retrieved. More recent PIR protocols also provide protection against Byzantine servers, such that a user can detect when one or more servers have attempted to tamper with the data he has requested. In some cases (as in the protocols presented by Beimel and Stahl [1]), the user can still recover his data and protect the contents of his query if the number of Byzantine servers is below a certain threshold; this property is referred to as Byzantine-recovery. However, tampering with a user\\textquoterights data is not the only goal a Byzantine server might have. We present a scenario in which an arbitrarily sized coalition of Byzantine servers transforms the userbase of a PIR network into a signaling framework with varying levels of detectability by means of a subliminal channel [11]. We describe several such subliminal channel techniques, illustrate several use-cases for this subliminal channel, and demonstrate its applicability to a wide variety of PIR protocols.","keywords":"private information retrieval","url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190","author":[{"firstnames":["Meredith","L."],"propositions":[],"lastnames":["Patterson"],"suffixes":[]},{"firstnames":["Len"],"propositions":[],"lastnames":["Sassaman"],"suffixes":[]}],"bibtex":"@conference {ringstwice07,\n\ttitle = {Subliminal Channels in the Private Information Retrieval Protocols},\n\tbooktitle = {Proceedings of the 28th Symposium on Information Theory in the Benelux},\n\tyear = {2007},\n\tpublisher = {Werkgemeenschap voor Informatie- en Communicatietheorie},\n\torganization = {Werkgemeenschap voor Informatie- en Communicatietheorie},\n\taddress = {Enschede,NL},\n\tabstract = {Information-theoretic private information retrieval (PIR) protocols, such as those described by Chor et al. [5], provide a mechanism by which users can retrieve information from a database distributed across multiple servers in such a way that neither the servers nor an outside observer can determine the contents of the data being retrieved. More recent PIR protocols also provide protection against Byzantine servers, such that a user can detect when one or more servers have attempted to tamper with the data he has requested. In some cases (as in the protocols presented by Beimel and Stahl [1]), the user can still recover his data and protect the contents of his query if the number of Byzantine servers is below a certain threshold; this property is referred to as Byzantine-recovery. However, tampering with a user{\\textquoteright}s data is not the only goal a Byzantine server might have. We present a scenario in which an arbitrarily sized coalition of Byzantine servers transforms the userbase of a PIR network into a signaling framework with varying levels of detectability by means of a subliminal channel [11]. We describe several such subliminal channel techniques, illustrate several use-cases for this subliminal channel, and demonstrate its applicability to a wide variety of PIR protocols.},\n\tkeywords = {private information retrieval},\n\turl = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190},\n\tauthor = {Meredith L. Patterson and Len Sassaman}\n}\n","author_short":["Patterson, M. L.","Sassaman, L."],"key":"ringstwice07","id":"ringstwice07","bibbaseid":"patterson-sassaman-subliminalchannelsintheprivateinformationretrievalprotocols-2007","role":"author","urls":{"Paper":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190"},"keyword":["private information retrieval"],"downloads":0},"search_terms":["subliminal","channels","private","information","retrieval","protocols","patterson","sassaman"],"keywords":["private information retrieval"],"authorIDs":[],"dataSources":["FWsPTwsmjtrBtRS3B"]}