private information retrieval
play

Private Information Retrieval Vesa Vaskelainen Helsinki University - PowerPoint PPT Presentation

T-79.514 Special Course on Cryptology Private Information Retrieval Vesa Vaskelainen Helsinki University of Technology vvaskela@cc.hut.fi T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 1 Overview of


  1. T-79.514 Special Course on Cryptology Private Information Retrieval Vesa Vaskelainen Helsinki University of Technology vvaskela@cc.hut.fi T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 1

  2. Overview of the Lecture • Private Information Retrieval (PIR) ⋆ Allow a user to retrieve information from a database while maintain- ing his query private • Symmetrically Private Information Retrieval (SPIR) ⋆ Quarantees also the privacy of the data, as well as of the user • Very Short Introduction to Quantum Mechanics ⋆ Formalism used in quantum computing • Quantum SPIR scheme on top of the classical PIR scheme T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 2

  3. Background • Data privacy is a natural and crucial requirement in many settings. For example, consider a commercial database which sells information, such as stock information, to users, charging by the amount of data that the user retrieved. Here, both user privacy and database privacy are essential. • Y. Gertner et al. Protecting Data Privacy in Private Information Re- trieval Schemes . Journal of Computer and Systems Sciences, 60(3):592–629, 2000. Earlier version in STOC 98. • I. Kerenidis, R. de Wolf. Quantum Symmerically-Private Information Retrieval . arXiv:quant-ph/0307076, 2003. T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 3

  4. Definitions • Database DB is a binary string x = x 1 . . . x n of length n , identical copies of this string are stored by k ≥ 2 servers • By [ l ] is denoted the set { 1 , 2 , . . . , l } . For any sets S, S ′ ⊆ [ l ] , we let S ⊕ S ′ denote the symmetric difference between S and S ′ (i.e., S ⊕ S ′ = ( S \ S ′ ) ∪ ( S ′ \ S ) ), and χ S denote the characteristic vector of S : an l -bit binary string whose j -th bit is equal to 1 iff j ∈ S . • { 0 , 1 } n is the set of strings of length n with each letter being either zero or one. T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 4

  5. • “PIR and SPIR scheme” refer to 1-round information theoretically pri- vate schemes • Complexity is measured in terms of communication • User privacy requirement: under any two indices i, i ′ , the communica- tion seen by any single database is identically distributed • The data privacy condition of SPIR schemes requires for any user interacting with the honest databases DB 1 , . . . , DB k there exists an index i s.t. for every data strings x, x ′ satisfying x i = x ′ i the distribution of communication is independent of the data strings x and x ′ . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 5

  6. Basic Cube Scheme k = 2 d databases, the size of n = l d , where d, l ∈ Z + . The in- dex set [ n ] , is identified with the d -dimensional cube [ l ] d . Each index i ∈ [ n ] , is identified with a d -tuple ( i 1 , . . . , i d ) . A d -dimensional subcube S 1 × · · · × S d ⊆ [ l ] d , where each S i ⊆ [ l ] . QUERIES: The user picks a random ( S 0 1 , . . . , S 0 d ) , where S 0 1 , . . . , S 0 d ⊆ [ l ] . Let S 1 m = S 0 m ⊕ i m (1 ≤ m ≤ d ) . For each σ = σ 1 σ 2 . . . σ d ∈ { 0 , 1 } d , 1 , . . . , S σ d the user sends to DB σ the subcube C σ = ( S σ 1 d ) , where each S σ m m is presented by its characteristic l -bit string. ∈ { 0 , 1 } d , computes XOR of the bits in ANSWERS: Each DB σ , σ the subcube C σ , and sends the resultant bit b σ to the user. RECONSTRUCTION: The user computes x i = � σ ∈{ 0 , 1 } d b σ . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 6

  7. PIR Scheme B 2 (2-database covering-codes scheme) l = n 1 / 3 , i = ( i 1 , i 2 , i 3 ) , DB 000 and DB 111 emulates the 4 databases DB σ , σ ∈ { 0 , 1 } 3 , s.t. Hamming distance of σ from its index is at most 1. ( S 0 1 , S 0 2 , S 0 QUERIES: The user sends C 000 = 3 ) to DB 000 and C 111 = ( S 1 1 , S 1 2 , S 1 3 ) to DB 111 . ANSWERS: DB 000 , 111 replies with single bits b 000 , 111 along with 3 l -bit long strings, i.e. DB 000 emulates DB 100 by computing � ( S 0 1 ⊕ i 1 , S 0 2 , S 0 3 ) for every i 1 ∈ [ l ] . RECONSTRUCTION: In the l -bit long strings, the index of the re- quired answer bit b σ is i 1 (for σ = 100 , 011 ), i 2 ( σ = 010 , 101 ), or i 3 ( σ = 001 , 110 ). The user computes x i = � σ ∈{ 0 , 1 } 3 b σ . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 7

  8. Correctness and Complexity • The correctness of the basic cube scheme follows from the fact that every bit in x except x i appears in an even number of subcubes C σ , σ ∈ { 0 , 1 } d , and x i appears in exactly one such subcube. • For the basic cube scheme communication complexity is k · ( d · l +1) = √ n + 1) = O ( n 1 /d ) 2 d · ( d · d √ n +1) = O ( n 1 / 3 ) . Note • B 2 has total communcation complexity 2(6 3 that it is too expensive to let DB 000 emulate DB 011 as this will require √ n ) 2 possibilities for ( S 1 2 , S 1 considering all ( 3 3 ) . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 8

  9. Conditional Disclosure of Secrets • The “condition” h : { 0 , 1 } n → { 0 , 1 } for some n ; an external party ∈ { 0 , 1 } n , which is also partitioned between the Carol holds y P 1 , . . . , P k players which have access to a shared random string (hid- den from Carol). A secret input s is known to at least one of the players. Based on its share of y and on the shared randomness, each P j si- multaneously sends a message to Carol, s.t. (1) if h ( y ) = 1 , then Carol is able to reconstruct the secret s ; and (2) if h ( y ) = 0 , then Carol obtains no information about s . • Claim 1. Suppose h : { 0 , 1 } n has a Boolean formula of size S ( n ) , and let s denote a secret bit known to at least one player. Then there exist a protocol for disclosing s subject to the condition h , whose total communication complexity is S ( n ) + 1 . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 9

  10. Private Simultaneous Messages (PSM) • Each player P 1 , . . . , P k is holding a private input string y j . All players have access to a shared random input, which is unknown to Carol. Based on y j and the shared random input, each player P j simulta- neously sends a single message to Carol. From the messages she received, Carol should be able to compute some predetermined func- tion f ( y 1 , . . . , y k ) , but should obtain no additional information on the input other than what follows from the value of f . • Example 1. In the basic cube scheme data privacy can be main- tained (respect to an honest user) if instead of sending original an- swer b σ , each DB σ sends a masked answer b σ ⊕ r σ , where r = r 0 ... 00 r 0 ... 01 . . . r 1 ... 11 are randomly chosen from the k -tuples whose bits XOR to 0. T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 10

  11. Honest-User-SPIR Schemes B ′ 2 and B ′ k • The reconstruction function of B 2 may be viewed as a two-stage pro- cedure: (1) the user selects a single bit from each of 8 answer strings, depending only on the index i ; and (2) the user exclusive-ors the 8 bits it has selected to obtain x i . • The user independently shares χ i m , m = 1 , 2 , 3 , among the two databases. ( r 0 m ⊕ r 1 m = χ i m ) • Each bit of a σ is an input to a PSM protocol computing the XOR of 8 answer bits. Let w σ denote the string where each bit from a σ is replaced by its corresponding PSM message bit. T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 11

  12. • For every σ ∈ { 0 , 1 } 3 and 1 ≤ j ≤ | w σ | , the database use their shared randomness to disclose to the user the j -th bit of w σ , ( w σ ) j , subject to an appropriate condition ( r 0 m ) j ⊕ ( r 1 m ) j = 1 . • The user reconstructs the eight PSM message bits corresponding to the index i (using the reconstruction function of the conditional disclo- sure protocol), and computes their exclusive-or to obtain x i . • Based on the Claim 1. it can be shown that the communication com- plexity of the B ′ 2 is O ( n 1 / 3 ) . Generalization gives, For every constant k ≥ 2 there exist a k - Theorem 1. database honest-user-SPIR scheme, B ′ k , of communication complex- ity O ( n 1 / (2 k − 1) ) . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 12

  13. Cube Schemes B ′′ 2 and B ′′ k • The user can cheat in two ways in the previous honest-user-SPIR scheme: sharing the all-ones vector instead of χ i m , and by sending invalid queries invalid queries in the original PIR scheme. (may obtain O ( n 1 / 3 ) physical data bits) • The databases share a random bit s . The bit s is disclosed to the user subject to the condition � 3 m =1 ( S 0 m ⊕ S 1 m = { r 0 m ⊕ r 1 m } ) which validates the user’s queries. • The honest user can reconstruct s and the 8 bits corresponding to index i and compute their exclusive-or to obtain x i . The user can only learn ( s ⊕ b 000 ⊕ b 111 ⊕ b ) , where b = � σ � =000 , 111 b σ . T-79.514 Special Course in Cryptology, Private Information Retrieval, Vesa Vaskelainen 13

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend