PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds

被引:0
|
作者
Ishai, Yuval [1 ]
Shi, Elaine [2 ]
Wichs, Daniel [3 ,4 ]
机构
[1] Technion, Haifa, Israel
[2] CMU, Pittsburgh, PA USA
[3] Northeastern Univ, Boston, MA 02115 USA
[4] NTT Res, Sunnyvale, CA USA
来源
ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IX | 2024年 / 14928卷
关键词
RETRIEVAL;
D O I
10.1007/978-3-031-68400-5_5
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It is well-known that classical Private Information Retrieval (PIR) schemes without preprocessing must suffer from linear server computation per query. Moreover, any such single-server PIR with sublinear bandwidth must rely on public-key cryptography. Several recent works showed that these barriers pertaining to classical PIR can be overcome by introducing a preprocessing phase where each client downloads a small hint that helps it make queries subsequently. Notably, the Piano PIR scheme (and subsequent improvements) showed that with such a client-side preprocessing, not only can we have PIR with sublinear computation and bandwidth per query, but somewhat surprisingly, we can also get it using only symmetric-key cryptography (i.e., one-way functions). In this paper, we take the question of minimizing cryptographic assumptions to an extreme. In particular, we are the first to explore the landscape of information theoretic single-server preprocessing PIR. We make contributions on both the upper- and lower-bounds fronts. First, we show new information-theoretic constructions with various non-trivial performance tradeoffs between server computation, client space and bandwidth. Second, we prove a (nearly) tight lower bound on the tradeoff between the client space and bandwidth in information-theoretic constructions. Finally, we prove that any computational scheme that overcomes the information-theoretic lower bound and satisfies a natural syntactic requirement (which is met by all known constructions) would imply a hard problem in the complexity class SZK. In particular, this shows that Piano achieves (nearly) optimal client space and bandwidth tradeoff subject to making a black-box use of a one-way function. Some of the techniques we use for the above results can be of independent interest.
引用
收藏
页码:148 / 182
页数:35
相关论文
共 50 条
  • [41] Information-Theoretic Regret Bounds for Bandits with Fixed Expert Advice
    Eldowa, Khaled
    Cesa-Bianchi, Nicolo
    Metelli, Alberto Maria
    Restelli, Marcello
    2023 IEEE INFORMATION THEORY WORKSHOP, ITW, 2023, : 30 - 35
  • [42] Information-Theoretic Bounds on the Moments of the Generalization Error of Learning Algorithms
    Aminian, Gholamali
    Toni, Laura
    Rodrigues, Miguel R. D.
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 682 - 687
  • [43] Statistical and Information-Theoretic Optimization and Performance Bounds of Video Steganography
    Sharifzadeh, Mehdi
    Schonfeld, Dan
    2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 1454 - 1457
  • [44] New Bounds on the Information-Theoretic Key Agreement of Multiple Terminals
    Gohari, Amin Aminzadeh
    Anantharam, Venkat
    2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, : 742 - 746
  • [45] Generalization Bounds for Meta-Learning: An Information-Theoretic Analysis
    Chen, Qi
    Shui, Changjian
    Marchand, Mario
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 34 (NEURIPS 2021), 2021, 34
  • [46] Information-Theoretic Generalization Bounds for Meta-Learning and Applications
    Jose, Sharu Theresa
    Simeone, Osvaldo
    ENTROPY, 2021, 23 (01) : 1 - 28
  • [47] Time-Independent Information-Theoretic Generalization Bounds for SGLD
    Futami, Futoshi
    Fujisawa, Masahiro
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 36 (NEURIPS 2023), 2023,
  • [48] INFORMATION-THEORETIC BOUNDS FOR AUTHENTICATION CODES AND BLOCK-DESIGNS
    PEI, DY
    JOURNAL OF CRYPTOLOGY, 1995, 8 (04) : 177 - 188
  • [49] Fundamental Error Bounds in State Estimation: An Information-Theoretic Analysis
    Fang, Song
    Chen, Jie
    Ishii, Hideaki
    2017 IEEE 56TH ANNUAL CONFERENCE ON DECISION AND CONTROL (CDC), 2017,
  • [50] AN INFORMATION-THEORETIC APPROACH TO TIME-BOUNDS FOR ONLINE COMPUTATION
    PAUL, WJ
    SEIFERAS, JI
    SIMON, J
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1981, 23 (02) : 108 - 126