Protecting Data Privacy in Private Information Retrieval Schemes

Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a sc...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of computer and system sciences 2000-06, Vol.60 (3), p.592-629
Hauptverfasser: Gertner, Yael, Ishai, Yuval, Kushilevitz, Eyal, Malkin, Tal
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 629
container_issue 3
container_start_page 592
container_title Journal of computer and system sciences
container_volume 60
creator Gertner, Yael
Ishai, Yuval
Kushilevitz, Eyal
Malkin, Tal
description Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k−1)) for every constant k⩾2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.
doi_str_mv 10.1006/jcss.1999.1689
format Article
fullrecord <record><control><sourceid>elsevier_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1006_jcss_1999_1689</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0022000099916896</els_id><sourcerecordid>S0022000099916896</sourcerecordid><originalsourceid>FETCH-LOGICAL-c392t-f1a013f44168a3bb71f9710fe70555ef6729859a433df02fa4823344fb45aca33</originalsourceid><addsrcrecordid>eNp1j8tOwzAQRS0EEqGwZZ0fSBg_8vAOVKBUqkTFY21NnTG4ahNkW5X69yQqW-5m7uaM7mHslkPJAeq7rY2x5FrrktetPmMZBw2FaIQ6ZxmAEAWMuWRXMW4BOK9qmbH7dRgS2eT7r_wRE-br4A9oj7nvTzVRvuzdEPaY_NDnb5SCpwPu8nf7TXuK1-zC4S7Szd-dsc_np4_5S7F6XSznD6vCSi1S4TgCl06pcRvKzabhTjccHDVQVRW5uhG6rTQqKTsHwqFqhZRKuY2q0KKUM1ae_towxBjImZ_g9xiOhoOZ_M3kbyZ_M_mPQHsCaFx18BRMtJ56S50Po7DpBv8f-gufT2F0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Protecting Data Privacy in Private Information Retrieval Schemes</title><source>Access via ScienceDirect (Elsevier)</source><source>EZB-FREE-00999 freely available EZB journals</source><creator>Gertner, Yael ; Ishai, Yuval ; Kushilevitz, Eyal ; Malkin, Tal</creator><creatorcontrib>Gertner, Yael ; Ishai, Yuval ; Kushilevitz, Eyal ; Malkin, Tal</creatorcontrib><description>Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k−1)) for every constant k⩾2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.</description><identifier>ISSN: 0022-0000</identifier><identifier>EISSN: 1090-2724</identifier><identifier>DOI: 10.1006/jcss.1999.1689</identifier><language>eng</language><publisher>Elsevier Inc</publisher><ispartof>Journal of computer and system sciences, 2000-06, Vol.60 (3), p.592-629</ispartof><rights>2000 Academic Press</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c392t-f1a013f44168a3bb71f9710fe70555ef6729859a433df02fa4823344fb45aca33</citedby><cites>FETCH-LOGICAL-c392t-f1a013f44168a3bb71f9710fe70555ef6729859a433df02fa4823344fb45aca33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1006/jcss.1999.1689$$EHTML$$P50$$Gelsevier$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Gertner, Yael</creatorcontrib><creatorcontrib>Ishai, Yuval</creatorcontrib><creatorcontrib>Kushilevitz, Eyal</creatorcontrib><creatorcontrib>Malkin, Tal</creatorcontrib><title>Protecting Data Privacy in Private Information Retrieval Schemes</title><title>Journal of computer and system sciences</title><description>Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k−1)) for every constant k⩾2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.</description><issn>0022-0000</issn><issn>1090-2724</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2000</creationdate><recordtype>article</recordtype><recordid>eNp1j8tOwzAQRS0EEqGwZZ0fSBg_8vAOVKBUqkTFY21NnTG4ahNkW5X69yQqW-5m7uaM7mHslkPJAeq7rY2x5FrrktetPmMZBw2FaIQ6ZxmAEAWMuWRXMW4BOK9qmbH7dRgS2eT7r_wRE-br4A9oj7nvTzVRvuzdEPaY_NDnb5SCpwPu8nf7TXuK1-zC4S7Szd-dsc_np4_5S7F6XSznD6vCSi1S4TgCl06pcRvKzabhTjccHDVQVRW5uhG6rTQqKTsHwqFqhZRKuY2q0KKUM1ae_towxBjImZ_g9xiOhoOZ_M3kbyZ_M_mPQHsCaFx18BRMtJ56S50Po7DpBv8f-gufT2F0</recordid><startdate>20000601</startdate><enddate>20000601</enddate><creator>Gertner, Yael</creator><creator>Ishai, Yuval</creator><creator>Kushilevitz, Eyal</creator><creator>Malkin, Tal</creator><general>Elsevier Inc</general><scope>6I.</scope><scope>AAFTH</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>20000601</creationdate><title>Protecting Data Privacy in Private Information Retrieval Schemes</title><author>Gertner, Yael ; Ishai, Yuval ; Kushilevitz, Eyal ; Malkin, Tal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c392t-f1a013f44168a3bb71f9710fe70555ef6729859a433df02fa4823344fb45aca33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2000</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Gertner, Yael</creatorcontrib><creatorcontrib>Ishai, Yuval</creatorcontrib><creatorcontrib>Kushilevitz, Eyal</creatorcontrib><creatorcontrib>Malkin, Tal</creatorcontrib><collection>ScienceDirect Open Access Titles</collection><collection>Elsevier:ScienceDirect:Open Access</collection><collection>CrossRef</collection><jtitle>Journal of computer and system sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Gertner, Yael</au><au>Ishai, Yuval</au><au>Kushilevitz, Eyal</au><au>Malkin, Tal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Protecting Data Privacy in Private Information Retrieval Schemes</atitle><jtitle>Journal of computer and system sciences</jtitle><date>2000-06-01</date><risdate>2000</risdate><volume>60</volume><issue>3</issue><spage>592</spage><epage>629</epage><pages>592-629</pages><issn>0022-0000</issn><eissn>1090-2724</eissn><abstract>Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k⩾2 databases (in the information-theoretic setting) or in k⩾1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new cryptographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k−1)) for every constant k⩾2 and an O(logn)-database SPIR scheme of complexity O(log2n·loglogn). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (n1)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.</abstract><pub>Elsevier Inc</pub><doi>10.1006/jcss.1999.1689</doi><tpages>38</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0022-0000
ispartof Journal of computer and system sciences, 2000-06, Vol.60 (3), p.592-629
issn 0022-0000
1090-2724
language eng
recordid cdi_crossref_primary_10_1006_jcss_1999_1689
source Access via ScienceDirect (Elsevier); EZB-FREE-00999 freely available EZB journals
title Protecting Data Privacy in Private Information Retrieval Schemes
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-22T10%3A41%3A47IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-elsevier_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Protecting%20Data%20Privacy%20in%20Private%20Information%20Retrieval%20Schemes&rft.jtitle=Journal%20of%20computer%20and%20system%20sciences&rft.au=Gertner,%20Yael&rft.date=2000-06-01&rft.volume=60&rft.issue=3&rft.spage=592&rft.epage=629&rft.pages=592-629&rft.issn=0022-0000&rft.eissn=1090-2724&rft_id=info:doi/10.1006/jcss.1999.1689&rft_dat=%3Celsevier_cross%3ES0022000099916896%3C/elsevier_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_els_id=S0022000099916896&rfr_iscdi=true