2019
DOI: 10.2478/popets-2019-0061
|View full text |Cite
|
Sign up to set email alerts
|

A Bit More Than a Bit Is More Than a Bit Better

Abstract: We study both the practical and theoretical efficiency of private information retrieval (PIR) protocols in a model wherein several untrusted servers work to obliviously service remote clients’ requests for data and yet no pair of servers colludes in a bid to violate said obliviousness. In exchange for such a strong security assumption, we obtain new PIR protocols exhibiting remarkable efficiency with respect to every cost metric—download, upload, computation, and round complexity—typically considered in the PI… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 27 publications
(45 reference statements)
0
4
0
Order By: Relevance
“…We begin our technical discussion by introducing the basic technologies underlying our construc-tion: Hafiz-Henry computationally 1-private PIR [24], Boolean matrix factorization-based collaborative filtering, and Du-Atallah 3-party multiplication [18]. Additionally, we give a bird's-eye overview of how PIRSONA uses the latter MPC to "glue" the first two (seemingly antithetical) primitives into a seamless, privacypreserving content distribution platform.…”
Section: Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…We begin our technical discussion by introducing the basic technologies underlying our construc-tion: Hafiz-Henry computationally 1-private PIR [24], Boolean matrix factorization-based collaborative filtering, and Du-Atallah 3-party multiplication [18]. Additionally, we give a bird's-eye overview of how PIRSONA uses the latter MPC to "glue" the first two (seemingly antithetical) primitives into a seamless, privacypreserving content distribution platform.…”
Section: Preliminariesmentioning
confidence: 99%
“…PIR is a cryptographic primitive using which users can fetch items from remote and untrusted database servers without disclosing to the servers which items they fetch. We focus on a specific class of PIR protocols-the so-called "1-private" multiserver scheme of Hafiz and Henry [24]-which provide extremely low download and server-side computation costs. These protocols provide the best-available mix of efficiency and expressiveness for the media delivery applications we target with PIRSONA.…”
Section: Private Information Retrievalmentioning
confidence: 99%
“…We specifically address the situation where a user wishes to retrieve information from an untrusted database without revealing to the database what specific information they wish to obtain. Private information retrieval (PIR) [3]- [6] is a cryptographic technique that solves this problem. However, while numerous privacy-enhancing technologies, including various PIR protocols, have been conceived over the past two decades to address this problem, the vast majority of them are not viable for facilitating a comprehensive set of statistical queries that might be required for performing data analytics on sensitive databases.…”
Section: Introductionmentioning
confidence: 99%
“…However, as discussed, this is obviously not practical because databases can be quite large. So we instead explore protocols with total communication costs less than (sublinear to) the database size, as stated in [6], as the non-triviality property of any practical PIR protocols.…”
Section: Introductionmentioning
confidence: 99%