improved user private information retrieval via finite
play

Improved User-Private Information Retrieval via Finite Geometry - PowerPoint PPT Presentation

Improved User-Private Information Retrieval via Finite Geometry RMIT Padraig O Cath ain (WPI) joint with Oliver W. Gnilke, Marcus Greferath, Camilla Hollanti, Guillermo Nu nez Ponasso, Eric Swartz 7th October 2019 Private


  1. Improved User-Private Information Retrieval via Finite Geometry RMIT Padraig ´ O Cath´ ain (WPI) joint with Oliver W. Gnilke, Marcus Greferath, Camilla Hollanti, Guillermo Nu˜ nez Ponasso, Eric Swartz 7th October 2019

  2. Private Information Retrieval ◮ I want to download the i th file F i of a Database ◮ I do not want someone who observes my request or the response from the Database to learn i .

  3. Private Information Retrieval ◮ I want to download the i th file F i of a Database ◮ I do not want someone who observes my request or the response from the Database to learn i . ◮ With a single Database, perfect privacy requires downloading all the files. ◮ What about multiple Databases?

  4. Private Information Retrieval ◮ I want to download the i th file F i of a Database ◮ I do not want someone who observes my request or the response from the Database to learn i . ◮ With a single Database, perfect privacy requires downloading all the files. ◮ What about multiple Databases? ◮ Assume all files are binary, and of equal length. Then request a random linear combination S = � j ∈ J F j of files from D 1 ◮ Request S + F i from D 2 , and compute the sum of the responses to recover F i .

  5. Private Information Retrieval ◮ I want to download the i th file F i of a Database ◮ I do not want someone who observes my request or the response from the Database to learn i . ◮ With a single Database, perfect privacy requires downloading all the files. ◮ What about multiple Databases? ◮ Assume all files are binary, and of equal length. Then request a random linear combination S = � j ∈ J F j of files from D 1 ◮ Request S + F i from D 2 , and compute the sum of the responses to recover F i . ◮ This works, if an eavesdropper agrees to observe only a single database...

  6. User Private Information Retrieval Setup ◮ A set U of users wants to communicate with an honest-but-curious database u 1 u 2 u 3 u 4 u 5 Database

  7. User Private Information Retrieval Setup ◮ A set U of users wants to communicate with an honest-but-curious database ◮ If the users send their requests directly an observer will be aware of the identity of the user u 1 u 2 u 3 u 4 u 5 Database

  8. User Private Information Retrieval Setup ◮ A set U of users wants to communicate with an honest-but-curious database ◮ Therefore the users will forward each M 1 M 2 M 3 others’ requests via shared message spaces M i , that are not visible to outside observers u 1 u 2 u 3 u 4 u 5 Database

  9. User Private Information Retrieval Setup ◮ A set U of users wants to communicate with an honest-but-curious database ◮ Therefore the users will forward each M 1 M 2 M 3 others’ requests via shared message spaces M i , that are not visible to outside observers u 1 u 2 u 3 u 4 u 5 ◮ If the users choose the proxy uniformly at random from the set of all users, perfect anonymity wrt. the database is Database achieved

  10. User Private Information Retrieval Setup ◮ A set U of users wants to communicate with an honest-but-curious database ◮ Therefore the users will forward each M 1 M 2 M 3 others’ requests via shared message spaces M i , that are not visible to outside observers u 1 u 2 u 3 u 4 u 5 ◮ If the users choose the proxy uniformly at random from the set of all users, perfect anonymity wrt. the database is Database achieved ◮ But what do the other users learn?

  11. User Private Information Retrieval Behaviour of the users ◮ Swanson and Stinson proved that user u i has perfect secrecy with respect to outside observers if and only if u i selects proxies uniformly at random from all of U (including u i ).

  12. User Private Information Retrieval Behaviour of the users ◮ Swanson and Stinson proved that user u i has perfect secrecy with respect to outside observers if and only if u i selects proxies uniformly at random from all of U (including u i ). ◮ All eavesdroppers will be considered honest-but-curious: they forward messages and follow instructions in the same way as non-eavesdroppers, but they remember queries they have seen, and may communicate these to other eavesdroppers.

  13. User Private Information Retrieval Behaviour of the users ◮ Swanson and Stinson proved that user u i has perfect secrecy with respect to outside observers if and only if u i selects proxies uniformly at random from all of U (including u i ). ◮ All eavesdroppers will be considered honest-but-curious: they forward messages and follow instructions in the same way as non-eavesdroppers, but they remember queries they have seen, and may communicate these to other eavesdroppers. ◮ In earlier works the requirement that every pair of users share at exactly one message space has been made: PBD

  14. User Private Information Retrieval Behaviour of the users ◮ Swanson and Stinson proved that user u i has perfect secrecy with respect to outside observers if and only if u i selects proxies uniformly at random from all of U (including u i ). ◮ All eavesdroppers will be considered honest-but-curious: they forward messages and follow instructions in the same way as non-eavesdroppers, but they remember queries they have seen, and may communicate these to other eavesdroppers. ◮ In earlier works the requirement that every pair of users share at exactly one message space has been made: PBD ◮ If all message spaces are the same size, and their number is minimized: projective plane

  15. Projective planes ◮ Every pair of points determine a unique line. ◮ Every pair of lines intersect in a unique point. ◮ There exist at least four points no three collinear.

  16. Projective planes ◮ Every pair of points determine a unique line. ◮ Every pair of lines intersect in a unique point. ◮ There exist at least four points no three collinear. ◮ Let V be a three dimensional vector space over field k . ◮ 1-d subspaces are projective points . ◮ 2-d subspaces are projective lines .

  17. Linked Queries Setup ◮ Queries can be linked by their content, e.g. obscure topics M 1 M 1 M 1 M 1 M 1 M 2 M 2 M 2 M 2 M 2 M 3 M 3 M 3 M 3 M 3 u 1 u 2 u 3 u 4 u 5 Database

  18. Linked Queries Setup ◮ Queries can be linked by their content, e.g. obscure topics ◮ Or by meta-content like user behaviour, timing, headers, etc. M 1 M 1 M 1 M 1 M 1 M 2 M 2 M 2 M 2 M 2 M 3 M 3 M 3 M 3 M 3 u 1 u 2 u 3 u 4 u 5 Database

  19. Linked Queries Setup ◮ Queries can be linked by their content, e.g. obscure topics ◮ Or by meta-content like user behaviour, timing, headers, etc. M 1 M 1 M 1 M 1 M 1 M 2 M 2 M 2 M 2 M 2 M 3 M 3 M 3 M 3 M 3 ◮ Collecting enough of these queries could identify a user within the network as the source of such requests u 1 u 2 u 3 u 4 u 5 and hence compromise her anonymity. Database

  20. Linked Queries Setup ◮ Queries can be linked by their content, e.g. obscure topics ◮ Or by meta-content like user behaviour, timing, headers, etc. M 1 M 1 M 1 M 1 M 1 M 2 M 2 M 2 M 2 M 2 M 3 M 3 M 3 M 3 M 3 ◮ Collecting enough of these queries could identify a user within the network as the source of such requests u 1 u 2 u 3 u 4 u 5 and hence compromise her anonymity. Database

  21. Linked Queries Setup ◮ Queries can be linked by their content, e.g. obscure topics ◮ Or by meta-content like user behaviour, timing, headers, etc. M 1 M 1 M 1 M 1 M 1 M 2 M 2 M 2 M 2 M 2 M 3 M 3 M 3 M 3 M 3 ◮ Collecting enough of these queries could identify a user within the network as the source of such requests u 1 u 2 u 3 u 4 u 5 and hence compromise her anonymity. ◮ Intersection attack! Database

  22. Privacy and Pseudonymity ◮ What is a good measure of privacy? ◮ Let C be a coalition of conspirators. ◮ Say that users u and v are pseudonymous if for any possible query observed by c ∈ C we have P ( u sent Q | c observed Q ) = P ( v sent Q | c observed Q ) P ( u sent Q ) P ( v sent Q ) ◮ A family of UPIR systems is secure against coalitions of size t , if for any C of at most t users, the probability that two users chosen uniformly at random are pseudonymous tends to 1 as the number of users tends to ∞ .

  23. Proejctive planes are always bad ◮ Suppose that every pair of users share a message space, and that users always send messages via shortest paths.

  24. Proejctive planes are always bad ◮ Suppose that every pair of users share a message space, and that users always send messages via shortest paths. ◮ Why? What are the pseudonymity classes with respect to user c ?

  25. Proejctive planes are always bad ◮ Suppose that every pair of users share a message space, and that users always send messages via shortest paths. ◮ Why? What are the pseudonymity classes with respect to user c ? ◮ If c , u 1 ∈ M 1 and u 2 / ∈ M 1 then u 1 and u 2 are not pseudonymous.

  26. Proejctive planes are always bad ◮ Suppose that every pair of users share a message space, and that users always send messages via shortest paths. ◮ Why? What are the pseudonymity classes with respect to user c ? ◮ If c , u 1 ∈ M 1 and u 2 / ∈ M 1 then u 1 and u 2 are not pseudonymous. ◮ If message spaces have size k , pseudonymity classes have size at most k − 1.

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend