Information-theoretic private information retrieval: A unified construction - (Extended abstract)

被引:0
|
作者
Beimel, A [1 ]
Ishai, Y [1 ]
机构
[1] Ben Gurion Univ Negev, IL-84105 Beer Sheva, Israel
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a database while hiding the identity of the item being retrieved. In a t-private, k-server PIR protocol the database is replicated among k servers, and the user's privacy is protected from any collusion of up to t servers. The main cost-measure of such protocols is the communication complexity of retrieving a single bit of data. This work addresses the information-theoretic setting for PIR, in which the user's privacy should be unconditionally protected from collusions of servers. We present a unified general construction, whose abstract components can be instantiated to yield both old and new families of PIR protocols. A main ingredient in the new protocols is a generalization of a solution by Babai, Kimmel, and Lokam to a communication complexity problem in the so-called simultaneous messages model. Our construction strictly improves upon previous constructions and resolves some previous anomalies. In particular, we obtain: (1) t-private k-server PIR protocols with O(n(1/[(2k-1)/t])) communication bits, where n is the database size. For t > 1, this is a substantial asymptotic improvement over the previous state of the art; (2) a constant-factor improvement in the communication complexity of 1-private PIR, providing the first improvement to the 2-server case since PIR protocols were introduced; (3) efficient PIR protocols with logarithmic query length. The latter protocols have applications to the construction of efficient families of locally decodable codes over large alphabets and to PIR protocols with reduced work by the servers.
引用
收藏
页码:912 / 926
页数:15
相关论文
共 50 条
  • [1] Robust information-theoretic private information retrieval
    Beimel, Amos
    Stahl, Yoav
    [J]. JOURNAL OF CRYPTOLOGY, 2007, 20 (03) : 295 - 321
  • [2] Robust Information-Theoretic Private Information Retrieval
    Amos Beimel
    Yoav Stahl
    [J]. Journal of Cryptology, 2007, 20 : 295 - 321
  • [3] Robust information-theoretic private information retrieval
    Beimel, A
    Stahl, Y
    [J]. SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 326 - 341
  • [4] General constructions for information-theoretic private information retrieval
    Beimel, A
    Ishai, Y
    Kushievitz, E
    [J]. JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2005, 71 (02) : 213 - 247
  • [5] A geometric approach to information-theoretic private information retrieval
    Woodruff, D
    Yekhanin, S
    [J]. TWENTIETH ANNUAL IEEE CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS, 2005, : 275 - 284
  • [6] A geometric approach to information-theoretic private information retrieval
    Woodruff, David
    Yekhanin, Sergey
    [J]. SIAM JOURNAL ON COMPUTING, 2007, 37 (04) : 1046 - 1056
  • [7] Querying Twice to Achieve Information-Theoretic Verifiability in Private Information Retrieval
    Kruglik, Stanislav
    Dau, Son Hoang
    Kiah, Han Mao
    Wang, Huaxiong
    Zhang, Liang Feng
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8172 - 8187
  • [8] An information-theoretic treatment of random-self-reducibility (extended abstract)
    Feigenbaum, J
    Strauss, M
    [J]. STACS 97 - 14TH ANNUAL SYMPOSIUM ON THEORETICAL ASPECTS OF COMPUTER SCIENCE, 1997, 1200 : 523 - 534
  • [9] Streaming Estimation of Information-Theoretic Metrics for Anomaly Detection (Extended Abstract)
    Bratus, Sergey
    Brody, Joshua
    Kotz, David
    Shubina, Anna
    [J]. RECENT ADVANCES IN INTRUSION DETECTION, RAID 2008, 2008, 5230 : 412 - 414
  • [10] Information-Theoretic Private Interactive Mechanism
    Moraffah, Bahman
    Sankar, Lalitha
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 911 - 918