Protecting Data Privacy in Private Information Retrieval Schemes

Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a sc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of computer and system sciences 2000-06, Vol.60 (3), p.592-629
Hauptverfasser: Gertner, Yael, Ishai, Yuval, Kushilevitz, Eyal, Malkin, Tal
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k−1)) for every constant k⩾2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.
ISSN:0022-0000
1090-2724
DOI:10.1006/jcss.1999.1689