General constructions for information-theoretic private information retrieval

被引:74
作者
Beimel, A
Ishai, Y
Kushievitz, E [1 ]
机构
[1] Ben Gurion Univ Negev, Dept Comp Sci, IL-84105 Beer Sheva, Israel
[2] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
基金
以色列科学基金会;
关键词
private information retrieval; information-theoretic cryptography; locally decodable codes; multiparty communication complexity; simultaneous messages protocols;
D O I
10.1016/j.jcss.2005.03.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a database while hiding the identity of the item being retrieved; specifically, in a t-private k-server PIR protocol the database is replicated among k servers, and the user's privacy is protected from any collusion of up to t servers. The main cost-measure of such protocols is the communication complexity of retrieving a single bit of data. This work addresses the information-theoretic setting for PIR, where the user's privacy should be unconditionally protected against computationally unbounded servers. We present a general construction, whose abstract components can be instantiated to yield both old and new families of PIR protocols. A main ingredient in the new protocols is a generalization of a solution by Babai, Gal, Kimmel, and Lokam for a communication complexity problem in the multiparty simultaneous messages model. Our protocols simplify and improve upon previous ones, and resolve some previous anomalies. In particular, we get (1) 1-private k-server PIR protocols with 0 (k(3)n(1/(2k- 1))) communication bits, where n is the database size; (2) t-private k-server protocols with O(n(1/[(2k- 1)/t])) communication bits, for any constant integers k > t >= 1; and (3) t-private k-server protocols in which the user sends O(log n) bits to each server and receives O(n(t/k+epsilon)) bits in return, for any constant integers k > t >= 1 and constant epsilon > 0. The latter protocols have applications to the construction of efficient families of locally decodable codes over large alphabets and to PIR protocols with reduced work by the servers. (c) 2005 Elsevier Inc. All rights reserved.
引用
收藏
页码:213 / 247
页数:35
相关论文
共 40 条
[1]  
Ambainis A, 1997, LECT NOTES COMPUT SC, V1256, P401
[2]   Improved upper bounds on the Simultaneous Messages complexity of the generalized addressing function [J].
Ambainis, A ;
Lokam, SV .
LATIN 2000: THEORETICAL INFORMATICS, 2000, 1776 :207-216
[3]  
[Anonymous], 1999, Proceedings of the Thirty-first Annual ACM Symposium on Theory of Computing, STOC '99
[4]   Communication complexity of simultaneous messages [J].
Babai, L ;
Gál, A ;
Kimmel, PG ;
Lokam, SV .
SIAM JOURNAL ON COMPUTING, 2003, 33 (01) :137-166
[5]  
BABAI L, 1995, LECT NOTES COMPUTER, V900, P361
[6]  
BEAVER D, 1990, LECT NOTES COMPUT SC, V415, P37
[7]  
BEAVER D, 1991, LECT NOTES COMPUT SC, V537, P62
[8]   Reducing the servers' computation in private information retrieval: PIR with preprocessing [J].
Beimel, A ;
Ishai, Y ;
Malkin, T .
JOURNAL OF CRYPTOLOGY, 2004, 17 (02) :125-151
[9]  
Beimel A, 2002, ANN IEEE SYMP FOUND, P261, DOI 10.1109/SFCS.2002.1181949
[10]  
Beimel A, 2001, LECT NOTES COMPUT SC, V2076, P912