Committed Private Information Retrieval

02/03/2023
by   Quang Cao, et al.
0

A private information retrieval (PIR) scheme allows a client to retrieve a data item x_i among n items x_1,x_2,...,x_n from k servers, without revealing what i is even when t < k servers collude and try to learn i. Such a PIR scheme is said to be t-private. A PIR scheme is v-verifiable if the client can verify the correctness of the retrieved x_i even when v ≤ k servers collude and try to fool the client by sending manipulated data. Most of the previous works in the literature on PIR assumed that v < k, leaving the case of all-colluding servers open. We propose a generic construction that combines a linear map commitment (LMC) and an arbitrary linear PIR scheme to produce a k-verifiable PIR scheme, termed a committed PIR scheme. Such a scheme guarantees that even in the worst scenario, when all servers are under the control of an attacker, although the privacy is unavoidably lost, the client won't be fooled into accepting an incorrect x_i. We demonstrate the practicality of our proposal by implementing the committed PIR schemes based on the Lai-Malavolta LMC and three well-known PIR schemes using the GMP library and , the current fastest C library for elliptic curve pairings.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/27/2023

Two-Server Private Information Retrieval with Optimized Download Rate and Result Verification

Private Information Retrieval (PIR) schemes allow a client to retrieve a...
research
08/23/2023

Private Information Retrieval with Private Noisy Side Information

Consider Private Information Retrieval (PIR), where a client wants to re...
research
02/11/2018

Robust Private Information Retrieval from Coded Systems with Byzantine and Colluding Servers

A private information retrieval (PIR) scheme on coded storage systems wi...
research
06/10/2021

Efficient Recovery of a Shared Secret via Cooperation: Applications to SDMM and PIR

This work considers the problem of privately outsourcing the computation...
research
01/07/2018

Private Computation of Systematically Encoded Data with Colluding Servers

Private Computation (PC), recently introduced by Sun and Jafar, is a gen...
research
06/22/2018

Staircase-PIR: Universally Robust Private Information Retrieval

We consider the problem of designing private information retrieval (PIR)...
research
07/20/2020

CACTI: Captcha Avoidance via Client-side TEE Integration

Preventing abuse of web services by bots is an increasingly important pr...

Please sign up or login with your details

Forgot password? Click here to reset