Protecting data privacy in private information retrieval schemes

Yael Gertner, Yuval Ishai, Eyal Kushilevitz, Tal Malkin

Research output: Contribution to journalConference articlepeer-review

216 Scopus citations

Abstract

Private information retrieval (PIR) schemes allow a user to retrieve the ith bit of an n-bit data string x, replicated in k ≥ 2 databases (in the information-theoretic setting) or in k ≥ 1 databases (in the computational setting), while keeping the value of i private. The main cost measure for such a scheme is its communication complexity. In this paper we introduce a model of symmetrically-private information retrieval (SPIR), where the privacy of the data, as well as the privacy of the user, is guaranteed. That is, in every invocation of a SPIR protocol, the user learns only a single physical bit of x and no other information about the data. Previously known PIR schemes severely fail to meet this goal. We show how to transform PIR schemes into SPIR schemes (with information-theoretic privacy), paying a constant factor in communication complexity. To this end, we introduce and utilize a new crytographic primitive, called conditional disclosure of secrets, which we believe may be a useful building block for the design of other cryptographic protocols. In particular, we get a k-database SPIR scheme of complexity O(n1/(2k - 1)) for every constant k ≥ 2 and an O(log n)-database SPIR scheme of complexity O(log2n · log log n). All our schemes require only a single round of interaction, and are resilient to any dishonest behavior of the user. These results also yield the first implementation of a distributed version of (1n)-OT (1-out-of-n oblivious transfer) with information-theoretic security and sublinear communication complexity.

Original languageEnglish
Pages (from-to)592-629
Number of pages38
JournalJournal of Computer and System Sciences
Volume60
Issue number3
DOIs
StatePublished - Jun 2000
EventThe 30th Annual ACM Symposium on Theory of Computing - Dallas, TX, USA
Duration: 23 May 199826 May 1998

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Networks and Communications
  • Computational Theory and Mathematics
  • Applied Mathematics

Fingerprint

Dive into the research topics of 'Protecting data privacy in private information retrieval schemes'. Together they form a unique fingerprint.

Cite this