Towards Doubly Efficient Private Information Retrieval

被引:37
|
作者
Canetti, Ran [1 ,2 ]
Holmgren, Justin [3 ]
Richelson, Silas [4 ]
机构
[1] Boston Univ, Boston, MA 02215 USA
[2] Tel Aviv Univ, Tel Aviv, Israel
[3] MIT, Cambridge, MA 02139 USA
[4] Univ Calif Riverside, Riverside, CA 92521 USA
来源
关键词
D O I
10.1007/978-3-319-70503-3_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Private Information Retrieval (PIR) allows a client to obtain data from a public database without disclosing the locations accessed. Traditionally, the stress is on preserving sublinear work for the client, while the server's work is taken to inevitably be at least linear in the database size. Beimel, Ishai and Malkin (JoC 2004) show PIR schemes where, following a linear-work preprocessing stage, the server's work per query is sublinear in the database size. However, that work only addresses the case of multiple non-colluding servers; the existence of single-server PIR with sublinear server work remained unaddressed. We consider single-server PIR schemes where, following a preprocessing stage in which the server obtains an encoded version of the database and the client obtains a short key, the per-query work of both server and client is polylogarithmic in the database size. Concentrating on the case where the client's key is secret, we show: - A scheme, based on one-way functions, that works for a bounded number of queries, and where the server storage is linear in the number of queries plus the database size. - A family of schemes for an unbounded number of queries, whose security follows from a corresponding family of new hardness assumption that are related to the hardness of solving a system of noisy linear equations. We also show the insufficiency of a natural approach for obtaining doubly efficient PIR in the setting where the preprocessing is public.
引用
收藏
页码:694 / 726
页数:33
相关论文
共 50 条
  • [41] Multi-Message Private Information Retrieval with Private Side Information
    Shariatpanahi, Seyed Pooya
    Siavoshani, Mahdi Jafari
    Maddah-Ali, Mohammad Ali
    2018 IEEE INFORMATION THEORY WORKSHOP (ITW), 2018, : 335 - 339
  • [42] The Capacity of Private Information Retrieval With Partially Known Private Side Information
    Wei, Yi-Peng
    Banawan, Karim
    Ulukus, Sennur
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (12) : 8222 - 8231
  • [43] The Capacity of T-Private Information Retrieval With Private Side Information
    Chen, Zhen
    Wang, Zhiying
    Jafar, Syed Ali
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (08) : 4761 - 4773
  • [44] Share Conversion and Private Information Retrieval
    Beimel, Amos
    Ishai, Yuval
    Kushilevitz, Eyal
    Orlov, Ilan
    2012 IEEE 27TH ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY (CCC), 2012, : 258 - 268
  • [45] Vectorized Batch Private Information Retrieval
    Mughees, Muhammad Haris
    Ren, Ling
    2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 437 - 452
  • [46] Asymmetric Leaky Private Information Retrieval
    Samy, Islam
    Attia, Mohamed
    Tandon, Ravi
    Lazos, Loukas
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2021, 67 (08) : 5352 - 5369
  • [47] Weakly-Private Information Retrieval
    Lin, Hsuan-Yin
    Kumar, Siddhartha
    Rosnes, Eirik
    Graell i Amat, Alexandre
    Yaakobi, Eitan
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1257 - 1261
  • [48] On the Storage Cost of Private Information Retrieval
    Tian, Chao
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (12) : 7539 - 7549
  • [49] On the Capacity of Leaky Private Information Retrieval
    Samy, Islam
    Tandon, Ravi
    Lazos, Loukas
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1262 - 1266
  • [50] The Capacity of Private Information Retrieval with Eavesdroppers
    Wang, Qiwen
    Sun, Hua
    Skoglund, Mikael
    2018 CONFERENCE RECORD OF 52ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, 2018, : 1679 - 1683