Replication is not needed: single database, computationally-private information retrieval
@article{Kushilevitz1997ReplicationIN, title={Replication is not needed: single database, computationally-private information retrieval}, author={Eyal Kushilevitz and Rafail Ostrovsky}, journal={Proceedings 38th Annual Symposium on Foundations of Computer Science}, year={1997}, pages={364-373} }
We establish the following, quite unexpected, result: replication of data for the computational private information retrieval problem is not necessary. More specifically, based on the quadratic residuosity assumption, we present a single database, computationally private information retrieval scheme with O(n/sup /spl epsiv//) communication complexity for any /spl epsiv/>0.
1,002 Citations
A report on : Private Information Retrieval
- Computer Science
- 1997
In this report, efficient information-theoretically secure methods of information retrieval are studied, ranging from traditional schemes using multiple replicated non-colluding servers, to schemes which use side information to reduce the communication complexity even in the single server case.
A new multi-server scheme for private information retrieval
- Computer ScienceAMS-EMS-SPM Joint Meeting
- 2016
A new scheme which takes both the time and communication complexities into consideration is introduced, which has a simple implementation and is especially suitable if there is only a small number of replicated servers available.
Reducing the Servers’ Computation in Private
Information Retrieval: PIR with Preprocessing
- Computer ScienceJournal of Cryptology
- 2004
Private information retrieval (PIR) enables a user to retrieve a specific data item from a database, replicated among one or more servers, while hiding from each server the identity of the retrieved…
A t-private k-database information retrieval scheme
- Computer ScienceInternational Journal of Information Security
- 2001
This paper presents a private information retrieval scheme for k replicated databases that is information-theoretic secure for coalitions of databases of size t≤k-1 and improves the communication complexity of the scheme described in Ishai and Kushilevitz 1999.
A t-Private k-Database Private Information Retrieval Scheme
- Computer Science
- 2001
A private information retrieval scheme enables a user to privately recover an item from a public accessible database. In this paper we present a private information retrieval scheme for k repli-cated…
Sublinear Scaling for Multi-Client Private Information Retrieval
- Computer ScienceFinancial Cryptography
- 2015
Using batch codes to allow a single client (or collaborating clients) to retrieve multiple records simultaneously while allowing the server computation to scale sublinearly with the number of records fetched.
Computationally Private Information Retrieval with Polylogarithmic Communication
- Computer ScienceEUROCRYPT
- 1999
A single-database computationally private information retrieval scheme with polylogarithmic communication complexity based on a new, but reasonable intractability assumption, which is essentially the difficulty of deciding whether a small prime divides φ(m), where m is a composite integer of unknown factorization.
On Symmetrically Private Information Retrieval
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2000
In this paper we present a single-round, single-server symmetrically private information retrieval scheme, in which privacy of user follows from intractability of the quadratic residuacity problem…
Private information retrieval for coded storage
- Computer Science2015 IEEE International Symposium on Information Theory (ISIT)
- 2015
It is proved that the tradeoff between storage cost and retrieval/download cost depends on the number of data records in the system, and proposes a class of linear storage codes and retrieval schemes, and derives conditions under which these schemes are error-free and private.
Information sharing across private databases
- Computer ScienceSIGMOD '03
- 2003
This work formalizes the notion of minimal information sharing across private databases, and develops protocols for intersection, equijoin, intersection size, and Equijoin size.
References
SHOWING 1-10 OF 41 REFERENCES
Private information retrieval
- Computer ScienceProceedings of IEEE 36th Annual Foundations of Computer Science
- 1995
Schemes that enable a user to access k replicated copies of a database and privately retrieve information stored in the database and get no information on the identity of the item retrieved by the user are described.
Computationally private information retrieval (extended abstract)
- Computer ScienceSTOC '97
- 1997
Improved efficiency is achieved by a combination of a novel balancing technique, together with careful application of pseudo random generators, and it is shown that the computational approach leads to substantial savings.
Private Information Retrieval by Keywords
- Computer ScienceIACR Cryptol. ePrint Arch.
- 1998
A simple, modular way to privately access data by keywords that combines any conventional search structure with any underlying PIR scheme (including single server schemes) and requires no modiication in the way that the search structure is maintained.
Upper Bound on Communication Complexity of Private Information Retrieval
- Computer ScienceICALP
- 1996
This work constructs a scheme for private information retrieval with k databases and communication complexity O(n 1/(2k−1) ), where n is the number of databases and O is the communication complexity.
Private Information Storage
- Computer ScienceIACR Cryptol. ePrint Arch.
- 1996
The result yields a solution to the problem of information-theoretically secure Oblivious RAM simulation with poly-log overhead in the above setting and implies that eecient instance-hiding schemes where the state can be altered are possible.
Protecting data privacy in private information retrieval schemes
- Computer Science, MathematicsSTOC '98
- 1998
This paper shows how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity, and introduces a new cryptographic primitive, called conditional disclosure of secrets, which it is believed may be a useful building block for the design of other cryptographic protocols.
A randomized protocol for signing contracts
- Computer Science, MathematicsCACM
- 1985
Randomized protocols for signing contracts, certified mail, and flipping a coin are presented and an implementation of the 1-out-of-2 oblivious transfer, using any public key cryptosystem, is presented.
Noninteractive Zero-Knowledge
- Mathematics, Computer ScienceSIAM J. Comput.
- 1991
This paper investigates the possibility of disposing of interaction between prover and verifier in a zero-knowledge proof if they share beforehand a short random string.Without any assumption, it i...
The Knowledge Complexity of Interactive Proof Systems
- Mathematics, Computer ScienceSIAM J. Comput.
- 1989
A computational complexity theory of the “knowledge” contained in a proof is developed and examples of zero-knowledge proof systems are given for the languages of quadratic residuosity and 'quadratic nonresiduosity.
Software protection and simulation on oblivious RAMs
- Computer Science, MathematicsJACM
- 1996
This paper shows how to do an on-line simulation of an arbitrary RAM by a probabilistic oblivious RAM with a polylogaithmic slowdown in the running time, and shows that a logarithmic slowdown is a lower bound.