Private information retrieval

被引:864
作者
Chor, B [1 ]
Goldreich, O
Kushilevitz, E
Sudan, M
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Weizmann Inst Sci, Dept Comp Sci & Appl Math, IL-76100 Rehovot, Israel
[3] MIT, Comp Sci Lab, Cambridge, MA 02139 USA
关键词
D O I
10.1145/293347.293350
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the ur;er, since a curious database operator can follow the user's queries and infer what the user is after. Indeed, in cases where the users' intentions are to be kept secret, users are often cautious about accessing the database. It can be shown that when accessing a single database, to completely guarantee the privacy of the user, the whole database should be down-loaded; namely it bits should be communicated (where n is the number of bits in the database). In this work, we investigate whether by replicating the database; more efficient solutions to the private retrieval problem can be obtained. We describe schemes that enable a user to access k replicated copies of a database (k greater than or equal to 2) and privately retrieve information stored in the database. This means that each individual server (holding a replicated copy of the database) gets no information on the identity of the item retrieved by the user. Our schemes use the replication to gain substantial saving. In particular, we present a two-server scheme with communication complexity O(n(1/3)).
引用
收藏
页码:965 / 982
页数:18
相关论文
共 27 条
[1]   ON HIDING INFORMATION FROM AN ORACLE [J].
ABADI, M ;
FEIGENBAUM, J ;
KILIAN, J .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1989, 39 (01) :21-50
[2]  
ADAM NR, 1989, COMPUT SURV, V21, P515, DOI 10.1145/76894.76895
[3]  
Ambainis A, 1997, LECT NOTES COMPUT SC, V1256, P401
[4]  
[Anonymous], 1982, CRYPTOGRAPHY DATA SE, DOI DOI 10.5555/539308
[5]  
[Anonymous], 2012, ADV CRYPTOLOGY CRYPT
[6]  
BABAI L, 1995, LECT NOTES COMPUTER, V900, P361
[7]  
BEAVER D, 1991, LECT NOTES COMPUT SC, V537, P62
[8]   Locally random reductions: Improvements and applications [J].
Beaver, D ;
Feigenbaum, J ;
Kilian, J ;
Rogaway, P .
JOURNAL OF CRYPTOLOGY, 1997, 10 (01) :17-36
[9]  
BEAVER D, 1990, LECT NOTES COMPUT SC, V415, P37
[10]  
CERI S, 1984, DISTRIBUTED DATABASE