Protecting data privacy in private information retrieval schemes

被引:198
|
作者
Gertner, Y
Ishai, Y
Kushilevitz, E
Malkin, T
机构
[1] Univ Penn, Dept Comp & Informat Sci, Philadelphia, PA 19104 USA
[2] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[3] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
关键词
D O I
10.1006/jcss.1999.1689
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an ri-bit data string x, replicated in k greater than or equal to 2 databases (in the information-theoretic setting) or in k greater than or equal to 1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data. as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n(1/t(2k-1))) for every constant k greater than or equal to 2 and an O(log n)-database SPIR scheme of complexity O(log(2) n . log log n) Ail our schemes require only a single round of interaction, and art resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of ((n)(1))-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity. (C) 2000 Academic Press.
引用
收藏
页码:592 / 629
页数:38
相关论文
共 50 条
  • [21] PROTECTING PRIVACY IN THE INFORMATION AGE
    TRUBOW, GB
    [J]. IEEE SOFTWARE, 1992, 9 (03) : 106 - 107
  • [22] Dealing with Privacy for Protecting Information
    Larrucea, Xabier
    Santamaria, Izaskun
    [J]. SYSTEMS, SOFTWARE AND SERVICES PROCESS IMPROVEMENT, EUROSPI 2021, 2021, 1442 : 518 - 530
  • [23] Cloud Data Storage and Private Information Retrieval Аlgorithms
    Varnovskiy, N.P.
    Martishin, S.A.
    Khrapchenko, M.V.
    Shokurov, A.V.
    [J]. Programming and Computer Software, 2024, 50 (06) : 425 - 434
  • [24] MaPIR: Mapping-Based Private Information Retrieval for Location Privacy in LBISs
    Wightman, P. M.
    Zurbaran, M.
    Rodriguez, M.
    Labrador, M. A.
    [J]. PROCEEDINGS OF THE 2013 38TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS), 2013, : 964 - 971
  • [25] Private Information Retrieval Through Wiretap Channel II: Privacy Meets Security
    Banawan, Karim
    Ulukus, Sennur
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (07) : 4129 - 4149
  • [26] Location Privacy in Cognitive Radios With Multi-Server Private Information Retrieval
    Grissa, Mohamed
    Yavuz, Attila Altay
    Hamdaoui, Bechir
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2019, 5 (04) : 949 - 962
  • [27] Private information retrieval
    Chor, B
    Goldreich, O
    Kushilevitz, E
    Sudan, M
    [J]. JOURNAL OF THE ACM, 1998, 45 (06) : 965 - 982
  • [28] Private Information Retrieval
    Yekhanin, Sergey
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 68 - 73
  • [29] Protecting privacy in an information age: The problem of privacy in public
    Nissenbaum, H
    [J]. LAW AND PHILOSOPHY, 1998, 17 (5-6) : 559 - 596
  • [30] Private Information Retrieval With Private Noisy Side Information
    ZivariFard, Hassan
    Chou, Remi A.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2024, 70 (04) : 2886 - 2902