This repository contains the code for our paper "Incremental Offline/Online PIR" in USENIX Security 2022.
- Implementation for incremental offline/online PIR protocol,
latency/throughput testing and simulation for Tor trace data (folder
inc-pir
) - Implementation for original CK PIR protocol (folder
baselines/ck-pir
) - DPF-PIR baseline imported from C++ DPF-PIR library (folder
baselines/dpf-pir
) [https://github.com/dkales/dpf-cpp]
Please refer to install.md for installing related dependencies.
We did experiments on CloudLab, but it can also be run locally on a linux machine.
In folder inc-pir/microbench
, run the script run.sh
. It will produce each column in the table. See here for more details.
For end-to-end tests, run binaries for server and client on two machines with the following parameters:
-i [ip addr]
-t [fixed time (0.01 per unit)] -l [offer load]
-d [db size] -s [set size] -n [nbrsets]
-a [incprep] -b [baseline]
where parameters for the server and the client should be the same except ip. See inc pir, ck baseline and dpf baseline for more details.
The server program needs to be manually killed, otherwise, it will always wait for new requests.
See instructions in inc pir, ck baseline and dpf baseline in each folder.
In folder inc-pir/simulate
, run sh run.sh
.