Computational Code-Based Single-Server Private Information Retrieval
Lukas Holzbaur, Camilla Hollanti, Antonia Wachter-Zeh Technical University of Munich Institute for Communications Engineering
Computational Code-Based Single-Server Private Information Retrieval - - PowerPoint PPT Presentation
Computational Code-Based Single-Server Private Information Retrieval Lukas Holzbaur , Camilla Hollanti, Antonia Wachter-Zeh Technical University of Munich Institute for Communications Engineering Private Information Retrieval Goal: Retrieve
Lukas Holzbaur, Camilla Hollanti, Antonia Wachter-Zeh Technical University of Munich Institute for Communications Engineering
the server(s)
1Chor, Benny, et al. "Private information retrieval." Proceedings of IEEE 36th Annual Foundations of Computer Science. IEEE, 1995. 2Sun, Hua, and Syed Ali Jafar. "The capacity of private information retrieval." IEEE Transactions on Information Theory 63.7 (2017): 4075-4088. 3Kadhe, Swanand, et al. "Private information retrieval with side information." IEEE Transactions on Information Theory (2019). 4Kushilevitz, Eyal, and Rafail Ostrovsky. "Replication is not needed: Single database, computationally-private information retrieval." Proceedings 38th
Annual Symposium on Foundations of Computer Science. IEEE, 1997. Lukas Holzbaur (TUM) 2
the server(s)
trivial “download-everything” solution1
1Chor, Benny, et al. "Private information retrieval." Proceedings of IEEE 36th Annual Foundations of Computer Science. IEEE, 1995. 2Sun, Hua, and Syed Ali Jafar. "The capacity of private information retrieval." IEEE Transactions on Information Theory 63.7 (2017): 4075-4088. 3Kadhe, Swanand, et al. "Private information retrieval with side information." IEEE Transactions on Information Theory (2019). 4Kushilevitz, Eyal, and Rafail Ostrovsky. "Replication is not needed: Single database, computationally-private information retrieval." Proceedings 38th
Annual Symposium on Foundations of Computer Science. IEEE, 1997. Lukas Holzbaur (TUM) 2
the server(s)
trivial “download-everything” solution1
1Chor, Benny, et al. "Private information retrieval." Proceedings of IEEE 36th Annual Foundations of Computer Science. IEEE, 1995. 2Sun, Hua, and Syed Ali Jafar. "The capacity of private information retrieval." IEEE Transactions on Information Theory 63.7 (2017): 4075-4088. 3Kadhe, Swanand, et al. "Private information retrieval with side information." IEEE Transactions on Information Theory (2019). 4Kushilevitz, Eyal, and Rafail Ostrovsky. "Replication is not needed: Single database, computationally-private information retrieval." Proceedings 38th
Annual Symposium on Foundations of Computer Science. IEEE, 1997. Lukas Holzbaur (TUM) 2
X = X 1 X 2 X 3
X m L
Lukas Holzbaur (TUM) 3
User chooses:
Qi =
Lukas Holzbaur (TUM) 4
User chooses:
qs
where each row Dl,: is chosen uniformly at random from C Qi = D
n
Lukas Holzbaur (TUM) 4
User chooses:
qs
where each row Dl,: is chosen uniformly at random from C
E ∈ V mδ×n−k i.i.d. at random Qi = D
n
E
Lukas Holzbaur (TUM) 4
User chooses:
qs
where each row Dl,: is chosen uniformly at random from C
E ∈ V mδ×n−k i.i.d. at random
Qi = D
n
E m(s − v)(n − k)
i Lukas Holzbaur (TUM) 4
X = X 1 X 2 X 3
· · ·
X m L
(s − v)(n − k)
Qi = D
+
n
+
E m(s − v)(n − k)
∆ ∆ ⊗ em
i
Server Replies with: Ai = X · Qi
qs
For simplicity, let L = 1.
Lukas Holzbaur (TUM) 5
User receives: Ai = X · Qi =
X l · (D(l−1)δ+1:lδ,: + E(l−1)δ+1:lδ,:)
Qi = D + n + E m(s − v)(n − k) ∆ ∆ ⊗ em
i
Lukas Holzbaur (TUM) 6
User receives: Ai = X · Qi =
X l · (D(l−1)δ+1:lδ,: + E(l−1)δ+1:lδ,:)
X l · D(l−1)δ+1:lδ,:
X l · E(l−1)δ+1:lδ,:
Qi = D + n + E m(s − v)(n − k) ∆ ∆ ⊗ em
i
Lukas Holzbaur (TUM) 6
User receives: Ai = X · Qi =
X l · (D(l−1)δ+1:lδ,: + E(l−1)δ+1:lδ,:)
X l · D(l−1)δ+1:lδ,:
X l · E(l−1)δ+1:lδ,:
Qi = D + n + E m(s − v)(n − k) ∆ ∆ ⊗ em
i
The set I is an information set, so the user can retrieve
X l · E(l−1)δ+1:lδ,:
Lukas Holzbaur (TUM) 6
X l · E(l−1)δ+1:lδ,:
Lukas Holzbaur (TUM) 7
X l · E(l−1)δ+1:lδ,:
Lukas Holzbaur (TUM) 7
X l · E(l−1)δ+1:lδ,:
Lukas Holzbaur (TUM) 7
X l · E(l−1)δ+1:lδ,:
Lukas Holzbaur (TUM) 7
The rate of the scheme is RPIR = L mδ + L
s(n − k)
n
For large files, i.e., L → ∞, the rate becomes RPIR = 1 − k + v
s(n − k)
n
Lukas Holzbaur (TUM) 8
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
Lukas Holzbaur (TUM) 9
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
E + ˆ
i
Lukas Holzbaur (TUM) 9
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
E + ˆ
i
E are from the space V
Lukas Holzbaur (TUM) 9
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
E + ˆ
i
E are from the space V
Lukas Holzbaur (TUM) 9
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
vector from a subspace Fn
qv, except for one, to which an additional error vector from the quotient space
qs/Fn qv is added. Find the word with the additional error vector from the quotient space. Lukas Holzbaur (TUM) 10
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
vector from a subspace Fn
qv, except for one, to which an additional error vector from the quotient space
qs/Fn qv is added. Find the word with the additional error vector from the quotient space.
Lukas Holzbaur (TUM) 10
Given a set of words in Fn
qs which are each the sum of a codeword of a random code C and an error
vector from a subspace Fn
qv, except for one, to which an additional error vector from the quotient space
qs/Fn qv is added. Find the word with the additional error vector from the quotient space.
Lukas Holzbaur (TUM) 10
considered setting
1Bordage, Sarah, and Julien Lavauzelle. "On the privacy of a code-based single-server computational PIR scheme." arXiv preprint arXiv:2004.00509
(2020). Lukas Holzbaur (TUM) 11
Conclusion
2Bordage, Sarah, and Julien Lavauzelle. "On the privacy of a code-based single-server computational PIR scheme." arXiv preprint arXiv:2004.00509
(2020). Lukas Holzbaur (TUM) 12
Conclusion
Future Work
2Bordage, Sarah, and Julien Lavauzelle. "On the privacy of a code-based single-server computational PIR scheme." arXiv preprint arXiv:2004.00509
(2020). Lukas Holzbaur (TUM) 12