Almost Optimal Private Information Retrieval
نویسندگان
چکیده
A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. With the initially proposed PIR protocols to process a query, the server has to process the entire database, resulting in an unacceptable response time for large databases. Later solutions make use of some preprocessing and oo-line communication, such that only O(1) on-line computation and communication are performed to execute a query. The major drawback of these solutions is oo-line communication, comparable to the size of the entire database. Using a secure coprocessor we construct a PIR scheme with O(1) on-line computation and communication, periodical oo-line preprocessing, and zero oo-line communication. The protocol is almost optimal. The only parameter left to improve is the server's oo-line preprocessing complexity-the least important one.
منابع مشابه
Secure Coprocessor-based Private Information Retrieval without Periodical Preprocessing
Early works on Private Information Retrieval (PIR) focused on minimizing the necessary communication overhead. They seemed to achieve this goal but at the expense of query response time. To mitigate this weakness, protocols with secure coprocessors were introduced. They achieve optimal communication complexity and better online processing complexity. Unfortunately, all secure coprocessor-based ...
متن کاملProblems related to combinatorial configurations with applications to P2P-user private information retrieval
We explain the applications that combinatorial configurations have to peer-to-peer user-private information retrieval and we analyze some problems that arise from these applications. In particular we deal with the existence of combinatorial configurations, the characterization of optimal configurations for peer-to-peer user-private information retrieval and the existence of configurations preve...
متن کاملBuilding Capacity-Achieving PIR Schemes with Optimal Sub-Packetization over Small Fields
Suppose a database containing M records is replicated across N servers, and a user wants to privately retrieve one record by accessing the servers such that identity of the retrieved record is secret against any up to T servers. A scheme designed for this purpose is called a T -private information retrieval (T PIR) scheme. Three indexes are concerned for PIR schemes: (1) rate, indicating the am...
متن کاملOptimal configurations for peer-to-peer user-private information retrieval
User-private information retrieval systems should protect the user’s anonymity when performing queries against a database, or they should limit the servers capacity of profiling users. Peer-to-peer user-private information retrieval (P2P UPIR) supplies a practical solution: the users in a group help each other in doing their queries, thereby preserving their privacy without any need of the data...
متن کاملLifting Private Information Retrieval from Two to any Number of Messages
We study private information retrieval (PIR) on coded data with possibly colluding servers. Devising PIR schemes with optimal download rate in the case of collusion and coded data is still open in general. We provide a lifting operation that can transform what we call one-shot PIR schemes for two messages into schemes for any number of messages. We apply this lifting operation on existing PIR s...
متن کامل