On Lower Bounds for the Communication Complexity of Private Information Retrieval∗
نویسنده
چکیده
Private information retrieval for k ≥ 1 databases (denoted by (k, )-PIR for short) is a protocol that (1) a user sends an tuple query to each of k noncommunicating replicated databases; (2) each database responds the user with an answer corresponding to the tuple query; (3) the user privately retrieve any single bit out of the n bits of data stored in k databases. In this model, “privacy” implies that the user retrieves the bit he is interested in but releases to each database nothing about which bit he wishes to get. In general, the efficiency of (k, )-PIR is measured by the total amount of bits exchanged between the user and the k databases, but few about its lower bounds are known except for restricted cases. In this paper, we classify (k, )-PIR into a linear type, a multilinear type, and an aÆne type with respect to the relationship between queries to each database (made by the user) and answers to the user (made by each database), and show that (1) the lower bound for the communication complexity of any multilinear type (k, )-PIR is Ω( +1 √ n) (Theorem 3.1); (2) the lower bound for the communication complexity of any linear type (k, )-PIR is Ω( √ n) (Corollary 3.2); (3) the lower bound for the communication complexity of any affine type (k, )-PIR is Ω( +1 √ n) (Theorem 4.2). key words: private information retrieval, communication com-
منابع مشابه
Private Information Retrieval Using Trusted Hardware
Many theoretical PIR (Private Information Retrieval) constructions have been proposed in the past years. Though information theoretically secure, most of them are impractical to deploy due to the prohibitively high communication and computation complexity. The recent trend in outsourcing databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system by making ...
متن کاملImproved Upper Bounds on Information-theoretic Private Information Retrieval
Private Information Retrieval (PIR) schemes allow a user to retrieve the i-th bit of an n-bit database x, replicated in k servers, while keeping the value of i private from each server. A t-private PIR scheme protects the user's privacy from any collusion of up to t servers. The main cost measure for such schemes is their communication complexity. We introduce a new technique for the constructi...
متن کاملExponential Lower Bound for 2-Query Locally Decodable Codes
We prove exponential lower bounds on the length of 2-query locally decodable codes. Goldreich et al. recently proved such bounds for the special case of linear locally decodable codes. Our proof shows that a 2-query locally decodable code can be decoded with only 1 quantum query, and then proves an exponential lower bound for such 1-query locally quantum-decodable codes. We also exhibit q-query...
متن کاملAn Ω(n) Lower Bound for Bilinear Group Based Private Information Retrieval
A two server private information retrieval (PIR) scheme allows a user U to retrieve the i-th bit of an n-bit string x replicated between two servers while each server individually learns no information about i. The main parameter of interest in a PIR scheme is its communication complexity, namely the number of bits exchanged by the user and the servers. A large amount of effort has been investe...
متن کاملAn Ω(n1/3) Lower Bound for Bilinear Group-Based Private Information Retrieval∗
A two-server private information retrieval (PIR) scheme allows a user U to retrieve the i-th bit of an n-bit string x replicated on two servers while each server individually learns no information about i. The main parameter of interest in a PIR scheme is its communication complexity: the number of bits exchanged by the user and the servers. Substantial effort has been invested by researchers o...
متن کامل