Protecting data privacy in private information retrieval schemes

被引:198
|
作者
Gertner, Y
Ishai, Y
Kushilevitz, E
Malkin, T
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
[2] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[3] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
关键词
D O I
10.1006/jcss.1999.1689
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an ri-bit data string x, replicated in k greater than or equal to 2 databases (in the information-theoretic setting) or in k greater than or equal to 1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data. as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n(1/t(2k-1))) for every constant k greater than or equal to 2 and an O(log n)-database SPIR scheme of complexity O(log(2) n . log log n) Ail our schemes require only a single round of interaction, and art resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of ((n)(1))-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity. (C) 2000 Academic Press.
引用
收藏
页码:592 / 629
页数:38
相关论文
共 50 条
  • [1] Protecting Access Privacy in Ethereum Using Differentially Private Information Retrieval
    Li, Xudong
    Ahmed, Farooq
    Wei, Lingbo
    Zhang, Chi
    Fang, Yuguang
    [J]. 2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2020,
  • [2] Private Information Retrieval Schemes for Coded Data with Arbitrary Collusion Patterns
    Tajeddine, Razane
    Gnilke, Oliver W.
    Karpuk, David
    Freij-Hollanti, Ragnar
    Hollanti, Camilla
    El Rouayheb, Salim
    [J]. 2017 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2017, : 1908 - 1912
  • [3] Differential Privacy for Protecting Private Patterns in Data Streams
    Gu, He
    Plagemann, Thomas
    Benndorf, Maik
    Goebel, Vera
    Koldehofe, Boris
    [J]. 2023 IEEE 39TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS, ICDEW, 2023, : 118 - 124
  • [4] Intermittent Private Information Retrieval With Application to Location Privacy
    Ye, Fangwei
    El Rouayheb, Salim
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2022, 40 (03) : 927 - 939
  • [5] New private information retrieval codes for imperfect privacy
    Tak, Jun-Woo
    Kim, Sang-Hyo
    Kim, Yongjune
    No, Jong-Seon
    [J]. ICT EXPRESS, 2024, 10 (04): : 891 - 894
  • [6] Private Information Retrieval Schemes Using Cyclic Codes
    Bodur, Seyma
    Martinez-Moro, Edgar
    Ruano, Diego
    [J]. ARITHMETIC OF FINITE FIELDS, WAIFI 2022, 2023, 13638 : 194 - 207
  • [7] PROTECTING STATISTICAL DATABASES AGAINST RETRIEVAL OF PRIVATE INFORMATION.
    Ahituv, Niv
    Lapid, Yeheskel
    Neumann, Seev
    [J]. Computers and Security, 1988, 7 (01): : 59 - 63
  • [8] A novel recursive privacy-preserving information retrieval approach for private retrieval
    Bhat, Radhakrishna
    Kumar, K.M. Mahesh
    Sunitha, N.R.
    [J]. International Journal of Intelligent Information and Database Systems, 2022, 15 (03): : 269 - 274
  • [9] SPIRAL:A Scalable Private Information Retrieval Approach to Location Privacy
    Khoshgozaran, Ali
    Shirani-Mehr, Houtan
    Shahabi, Cyrus
    [J]. 2008 NINTH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT WORKSHOPS, 2008, : 49 - 56
  • [10] Secure data encryption key scenario for protecting private data security and privacy
    Mandal, Sanjeev Kumar
    Sharma, Amit
    Henge, Santosh Kumar
    Bashir, Sumaira
    Shukla, Madhuresh
    Pathak, Asim Tara
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2A): : 269 - 281