Information-theoretic Private Information Retrieval: A unified construction (extended abstract)

73Citations
Citations of this article
44Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A Private Information Retrieval (PIR) protocol enables a user to retrieve a data item from a database while hiding the identity of the item being retrieved. In a t-private, k-server PIR protocol the database is replicated among k servers, and the user's privacy is protected from any collusion of up to t servers. The main cost-measure of such protocols is the communication complexity of retrieving a single bit of data. This work addresses the information-theoretic setting for PIR, in which the user's privacy should be unconditionally protected from collusions of servers. We present a unified general construction, whose abstract components can be instantiated to yield both old and new families of PIR protocols. A main ingredient in the new protocols is a generalization of a solution by Babai, Kimmel, and Lokam to a communication complexity problem in the so-called simultaneous messages model. Our construction strictly improves upon previous constructions and resolves some previous anomalies. In particular, we obtain: (1) t-private k-server PIR protocols with O(n1/b(2k-1)/t) communication bits, where n is the database size. For t < 1, this is a substantial asymptotic improvement over the previous state of the art; (2) a constant-factor improvement in the communication complexity of 1-private PIR, providing the first improvement to the 2-server case since PIR protocols were introduced; (3) effcient PIR protocols with logarithmic query length. The latter protocols have applications to the construction of effcient families of locally decodable codes over large alphabets and to PIR protocols with reduced work by the servers. © 2011 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Beimel, A., & Ishai, Y. (2001). Information-theoretic Private Information Retrieval: A unified construction (extended abstract). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2076 LNCS, pp. 912–926). Springer Verlag. https://doi.org/10.1007/3-540-48224-5_74

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free