Detering Dishonest Behaviour in Private Information Retrieval
نویسنده
چکیده
It is useful to support Byzantine robustness in a Private Information Retrieval (PIR) protocol so that any database operators that are being used cannot maliciously affect the records that a client is looking for. We analyze the problem of Byzantine servers in Goldberg’s IT-PIR protocol and relate the problem to the well known stag hunt game. To make this game more applicable, we expand it to include more than two agents, we define a multi-round game and incorporate the idea of punishing dishonest behaviour. Using the relationship between this problem and the that of collusion between PIR servers, we design a mechansim to deter servers from Byzantine behaviour.
منابع مشابه
Problems related to combinatorial configurations with applications to P2P-user private information retrieval
We explain the applications that combinatorial configurations have to peer-to-peer user-private information retrieval and we analyze some problems that arise from these applications. In particular we deal with the existence of combinatorial configurations, the characterization of optimal configurations for peer-to-peer user-private information retrieval and the existence of configurations preve...
متن کاملQuantum Symmetrically-Private Information Retrieval
Private information retrieval systems (PIRs) allow a user to extract an item from a database that is replicated over k ≥ 1 servers, while satisfying various privacy constraints. We exhibit quantum k-server symmetrically-private information retrieval systems (QSPIRs) that use sublinear communication, do not use shared randomness among the servers, and preserve privacy against honest users and di...
متن کاملScreening Ethics when Honest Agents Care about Fairness
We explore the potential for discriminating between honest and dishonest agents, when a principal faces an agent with private information about the circumstances of the exchange (good or bad). When honest agents reveal circumstances truthfully independently of the contract offered, the principal leaves a rent only to dishonest agents (even if honest agents are willing to lie about their ethics)...
متن کاملUsing (0, 1)-geometries for collusion-free P2P-user private information retrieval
Using (0, 1)-geometries for collusion-free P2P-user private information retrieval Maria Bras-Amorós, Klara Stokes, Marcus Greferath In the previous years some effort has been done for finding systems guaranteeing private information retrieval (PIR) in front of a data base or a search engine [2]. The aim is that the server owing the information to be retrieved should not learn what are the queri...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کامل