Towards Doubly Efficient Private Information Retrieval

被引:37
|
作者
Canetti, Ran [1 ,2 ]
Holmgren, Justin [3 ]
Richelson, Silas [4 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Tel Aviv Univ, Tel Aviv, Israel
[3] MIT, Cambridge, MA 02139 USA
[4] Univ Calif Riverside, Riverside, CA 92521 USA
来源
关键词
D O I
10.1007/978-3-319-70503-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private Information Retrieval (PIR) allows a client to obtain data from a public database without disclosing the locations accessed. Traditionally, the stress is on preserving sublinear work for the client, while the server's work is taken to inevitably be at least linear in the database size. Beimel, Ishai and Malkin (JoC 2004) show PIR schemes where, following a linear-work preprocessing stage, the server's work per query is sublinear in the database size. However, that work only addresses the case of multiple non-colluding servers; the existence of single-server PIR with sublinear server work remained unaddressed. We consider single-server PIR schemes where, following a preprocessing stage in which the server obtains an encoded version of the database and the client obtains a short key, the per-query work of both server and client is polylogarithmic in the database size. Concentrating on the case where the client's key is secret, we show: - A scheme, based on one-way functions, that works for a bounded number of queries, and where the server storage is linear in the number of queries plus the database size. - A family of schemes for an unbounded number of queries, whose security follows from a corresponding family of new hardness assumption that are related to the hardness of solving a system of noisy linear equations. We also show the insufficiency of a natural approach for obtaining doubly efficient PIR in the setting where the preprocessing is public.
引用
收藏
页码:694 / 726
页数:33
相关论文
共 50 条
  • [1] Towards Practical Doubly-Efficient Private Information Retrieval
    Okada, Hiroki
    Player, Rachel
    Pohmann, Simon
    Weinert, Christian
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2024, PT II, 2025, 14745 : 264 - 282
  • [2] Efficient private information retrieval
    Itoh, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01): : 11 - 20
  • [3] Doubly Efficient Private Information Retrieval and Fully Homomorphic RAM Computation from Ring LWE
    Lin, Wei-Kai
    Mook, Ethan
    Wichs, Daniel
    PROCEEDINGS OF THE 55TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2023, 2023, : 595 - 608
  • [4] Efficient Private Information Retrieval for Geographical Aggregation
    Dankar, Fida K.
    El Emam, Khaled
    Matwin, Stan
    5TH INTERNATIONAL CONFERENCE ON EMERGING UBIQUITOUS SYSTEMS AND PERVASIVE NETWORKS / THE 4TH INTERNATIONAL CONFERENCE ON CURRENT AND FUTURE TRENDS OF INFORMATION AND COMMUNICATION TECHNOLOGIES IN HEALTHCARE / AFFILIATED WORKSHOPS, 2014, 37 : 497 - +
  • [5] Improved Storage for Efficient Private Information Retrieval
    Banawan, Karim
    Arasli, Batuhan
    Ulukus, Sennur
    2019 IEEE INFORMATION THEORY WORKSHOP (ITW), 2019, : 474 - 478
  • [6] Efficient Private Information Retrieval Over Unsynchronized Databases
    Fanti, Giulia
    Ramchandran, Kannan
    IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) : 1229 - 1239
  • [7] An Efficient Private Information Retrieval Protocol Based on TFHE
    Tian, Haibo
    Lin, Yini
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT I, SECURECOMM 2023, 2025, 567 : 476 - 495
  • [8] Towards practical private information retrieval from homomorphic encryption
    Zhuravlev, Dmitry
    ALGEBRA & DISCRETE MATHEMATICS, 2015, 19 (02): : 302 - 312
  • [9] Private information retrieval
    Chor, B
    Goldreich, O
    Kushilevitz, E
    Sudan, M
    JOURNAL OF THE ACM, 1998, 45 (06) : 965 - 982
  • [10] Private Information Retrieval
    Yekhanin, Sergey
    COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 68 - 73