2016
DOI: 10.1145/2968443
|View full text |Cite
|
Sign up to set email alerts
|

2-Server PIR with Subpolynomial Communication

Abstract: A 2-server Private Information Retrieval (PIR) scheme allows a user to retrieve the i th bit of an n -bit database replicated among two noncommunicating servers, while not revealing any information about i to either server. In this work, we construct a 2-server PIR scheme with total communication cost n O (√log / log n log n ).… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(32 citation statements)
references
References 17 publications
0
32
0
Order By: Relevance
“…In a breakthrough result, the work in [13] matched the CC of two-server PIR with the CC of the best-known three-server PIR, improving from the best previously-known 2 n/3 to 2 O( √ nlog(n)) . Their work cleverly combined and extended several non-trivial ideas, both new and ones that appeared in previous work in some form.…”
Section: Two-server Pirmentioning
confidence: 99%
See 1 more Smart Citation
“…In a breakthrough result, the work in [13] matched the CC of two-server PIR with the CC of the best-known three-server PIR, improving from the best previously-known 2 n/3 to 2 O( √ nlog(n)) . Their work cleverly combined and extended several non-trivial ideas, both new and ones that appeared in previous work in some form.…”
Section: Two-server Pirmentioning
confidence: 99%
“…The reconstruction procedure uses the shared evaluations as derivatives to compute this free coefficient, which is non-zero iff a x is one. In the original protocol description of [13], the client used the input for reconstructing the output, which is not consistent with share conversion, where the input is not required for reconstruction. We restate the above protocol by letting the servers "play back" the original shares to the client to stay consistent with the BIKO share conversion framework.…”
mentioning
confidence: 99%
“…For t = 1 and r = 2, Chor et al [11] constructed the first 2-server PIR with communication complexity O(n 1/3 ), which has been optimal for a long time. Dvir and Gopi [13] improved [11] with a 2-server PIR of communication complexity n O((log log n/ log n) 1/2 ) , which is the current record. For t = 1 and any r > 1, Ambainis [1] and Beimel et al [4] constructed (t, r)-PIR schemes with communication complexity O(2 r 2 n 1/(2r−1) ) and n O(log log r/r log r) , respectively.…”
Section: B Related Workmentioning
confidence: 99%
“…The reconstruction algorithms in [3], [11], [17] are fixed and the reconstruction algorithm in [13], [14] relies on a parameter (aux), which is generated by the user. In the itFSS scheme obtained from the PIR scheme in [14], the reconstructor can still learn f α,1 (α ) from the shares without this parameter if we modify the output decoder.…”
Section: More Instantiationsmentioning
confidence: 99%
“…3 LDCs where the codewords are over a large alphabet are studied because of their relation to private information retrieval schemes [11,25]. In [15], 2-query LDCs of length n = exp(k o (1) ) over an alphabet of size exp(k o(1) ) were constructed. There is also some exciting recent work on LDCs where the number of queries grows with k, in which case there are explicit constructions with constant rate (that is, n = O(k)) and query complexity q = exp(O( √ log n)); in fact we can even achieve the optimal rate-distance tradeoff of traditional error correcting codes [29,28,22].…”
Section: Introductionmentioning
confidence: 99%