Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an ri-bit data string x, replicated in k greater than or equal to 2 databases (in the information-theoretic setting) or in k greater than or equal to 1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data. as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n(1/t(2k-1))) for every constant k greater than or equal to 2 and an O(log n)-database SPIR scheme of complexity O(log(2) n . log log n) Ail our schemes require only a single round of interaction, and art resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of ((n)(1))-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity. (C) 2000 Academic Press.