On Share Conversions for Private Information Retrieval

被引:1
|
作者
Paskin-Cherniaysky, Anat [1 ]
Schmerler, Leora [1 ]
机构
[1] Ariel Univ, Comp Sci Dept, IL-40700 Ariel, Israel
关键词
PIR; Share conversion; CNF secret sharing; communication complexity; SINGLE-DATABASE;
D O I
10.3390/e21090826
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Beimel et al. in CCC 12' put forward a paradigm for constructing Private Information Retrieval (PIR) schemes, capturing several previous constructions for k >= 3 servers. A key component in the paradigm, applicable to three-server PIR, is a share conversion scheme from corresponding linear three-party secret sharing schemes with respect to a certain type of "modified universal" relation. In a useful particular instantiation of the paradigm, they used a share conversion from (2, 3)-CNF over Z(m) to three-additive sharing over Z(p)(beta) for primes p(1), P-2, p where p(1)not equal p(2) and m = p(1).p(2). The share conversion is with respect to the modified universal relation C-Sm. They reduced the question of whether a suitable share conversion exists for a triple (p(1), p(2), p) to the (in)solvability of a certain linear system over Z(p). Assuming a solution exists, they also provided a efficient (in m, log p) construction of such a sharing scheme. They proved a suitable conversion exists for several triples of small numbers using a computer program; in particular, p = p(1) = 2, p(2) = 3 yielded the three-server PIR with the best communication complexity at the time. This approach quickly becomes infeasible as the resulting matrix is of size Theta(m(4)). In this work, we prove that the solvability condition holds for an infinite family of (p(1), p(2), p)'s, answering an open question of Beimel et al. Concretely, we prove that if p(1), p(2) > 2 and p = p(1), then a conversion of the required form exists. We leave the full characterization of such triples, with potential applications to PIR complexity, to future work. Although larger (particularly with max (p(1), p(2)) > 3) triples do not yield improved three-server PIR communication complexity via BIKO's construction, a richer family of PIR protocols we obtain by plugging in our share conversions might have useful properties for other applications. Moreover, we hope that the analytic techniques for understanding the relevant matrices we developed would help to understand whether share conversion as above for C-Sm, where m is a product of more than two (say three) distinct primes, exists. The general BIKO paradigm generalizes to work for such Z(m)'s. Furthermore, the linear condition in Beimel et al. generalizes to m's, which are products of more than two primes, so our hope is somewhat justified. In case such a conversion does exist, plugging it into BIKO's construction would lead to major improvement to the state of the art of three-server PIR communication complexity (reducing Communication Complexity (CC) in correspondence with certain matching vector families).
引用
收藏
页数:31
相关论文
共 50 条
  • [1] Share Conversion and Private Information Retrieval
    Beimel, Amos
    Ishai, Yuval
    Kushilevitz, Eyal
    Orlov, Ilan
    2012 IEEE 27TH ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2012, : 258 - 268
  • [2] Private information retrieval
    Chor, B
    Goldreich, O
    Kushilevitz, E
    Sudan, M
    JOURNAL OF THE ACM, 1998, 45 (06) : 965 - 982
  • [3] Private Information Retrieval
    Yekhanin, Sergey
    COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 68 - 73
  • [4] Private Information Retrieval With Private Noisy Side Information
    ZivariFard, Hassan
    Chou, Remi A.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (04) : 2886 - 2902
  • [5] Private Information Retrieval With Side Information
    Kadhe, Swanand
    Garcia, Brenden
    Heidarzadeh, Anoosheh
    El Rouayheb, Salim
    Sprintson, Alex
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (04) : 2032 - 2043
  • [6] Private Information Retrieval with Partially Known Private Side Information
    Wei, Yi-Peng
    Banawan, Karim
    Ulukus, Sennur
    2018 52ND ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS), 2018,
  • [7] Authenticated private information retrieval
    Colombo, Simone
    Nikitin, Kirill
    Corrigan-Gibbs, Henry
    Wu, David J.
    Ford, Bryan
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 3835 - 3851
  • [8] The Capacity of Private Information Retrieval
    Sun, Hua
    Jafar, Syed A.
    2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
  • [9] Noisy Private Information Retrieval
    Banawan, Karim
    Ulukus, Sennur
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 1694 - 1698
  • [10] Verifiable Private Information Retrieval
    Ben-David, Shany
    Kalai, Yael Tauman
    Paneth, Omer
    THEORY OF CRYPTOGRAPHY, TCC 2022, PT III, 2022, 13749 : 3 - 32