Private information retrieval
- 1 November 1998
- journal article
- Published by Association for Computing Machinery (ACM) in Journal of the ACM
- Vol. 45 (6) , 965-981
- https://doi.org/10.1145/293347.293350
Abstract
Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the user, since a curious database operator can follow the user's queries and infer what the user is after. Indeed, in cases where the users' intentions are to be kept secret, users are often cautious about accessing the database. It can be shown that when accessing a single database, to completely guarantee the privacy of the user, the whole database should be down-loaded; namely n bits should be communicated (where n is the number of bits in the database). In this work, we investigate whether by replicating the database, more efficient solutions to the private retrieval problem can be obtained. We describe schemes that enable a user to access k replicated copies of a database ( k ≥2) and privately retrieve information stored in the database. This means that each individual server (holding a replicated copy of the database) gets no information on the identity of the item retrieved by the user. Our schemes use the replication to gain substantial saving. In particular, we present a two-server scheme with communication complexity O(n 1/3 ).Keywords
This publication has 14 references indexed in Scilit:
- Locally random reductions: Improvements and applicationsJournal of Cryptology, 1997
- Boolean Circuits, Tensor Ranks, and Communication ComplexitySIAM Journal on Computing, 1997
- Software protection and simulation on oblivious RAMsJournal of the ACM, 1996
- A modified random perturbation method for database securityACM Transactions on Database Systems, 1994
- On the power of two-local random reductionsInformation Processing Letters, 1992
- Modified bounds for covering codesIEEE Transactions on Information Theory, 1991
- Security-control methods for statistical databases: a comparative studyACM Computing Surveys, 1989
- On hiding information from an oracleJournal of Computer and System Sciences, 1989
- Security problems on inference control for SUM, MAX, and MIN queriesJournal of the ACM, 1986
- Secure databasesACM Transactions on Database Systems, 1979