Lower Bounds for (Batch) PIR with Private Preprocessing

被引:8
|
作者
Yeo, Kevin [1 ,2 ]
机构
[1] Google, New York, NY 10011 USA
[2] Columbia Univ, New York, NY 10027 USA
关键词
LOCALLY DECODABLE CODES; INFORMATION-RETRIEVAL; SINGLE-DATABASE;
D O I
10.1007/978-3-031-30545-0_18
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study (batch) private information retrieval with private preprocessing. Private information retrieval (PIR) is the problem where one or more servers hold a database of n bits and a client wishes to retrieve the i-th bit in the database from the server(s). In PIR with private preprocessing (also known as offline-online PIR), the client is able to compute a private r-bit hint in an offline stage that may be leveraged to perform retrievals accessing at most t entries. For privacy, the client wishes to hide index i from an adversary that has compromised some of the servers. In the batch PIR setting, the client performs queries to retrieve the contents of multiple entries simultaneously. We present a tight characterization for the trade-offs between hint size r and number of accessed entries t during queries. For any PIR scheme that enables clients to perform batch retrievals of k entries, we prove a lower bound of tr = ohm(nk) when r >= k. When r < k, we prove that t = ohm(n). Our lower bounds hold when the scheme errs with probability at most 1/15 and against PPT adversaries that only compromise one out of l servers for any l = O(1). Our work also closes the multiplicative logarithmic gap for the single query setting (k = 1) as our lower bound matches known constructions. Our lower bounds hold in the model where each database entry is stored without modification but each entry may be replicated arbitrarily. Finally, we show connections between PIR and the online matrixvector (OMV) conjecture from fine-grained complexity. We present barriers for proving lower bounds for two-server PIR schemes in general computational models as they would immediately imply the OMV conjecture.
引用
收藏
页码:518 / 550
页数:33
相关论文
共 50 条
  • [1] PIR with Client-Side Preprocessing: Information-Theoretic Constructions and Lower Bounds
    Ishai, Yuval
    Shi, Elaine
    Wichs, Daniel
    ADVANCES IN CRYPTOLOGY - CRYPTO 2024, PT IX, 2024, 14928 : 148 - 182
  • [2] Bounds on the Length of Functional PIR and Batch Codes
    Zhang, Yiwei
    Yaakobi, Eitan
    Etzion, Tuvi
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 2129 - 2133
  • [3] Bounds on the Length of Functional PIR and Batch Codes
    Zhang, Yiwei
    Etzion, Tuvi
    Yaakobi, Eitan
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2020, 66 (08) : 4917 - 4934
  • [4] Reducing the servers' computation in private information retrieval: PIR with preprocessing
    Beimel, A
    Ishai, Y
    Malkin, T
    JOURNAL OF CRYPTOLOGY, 2004, 17 (02) : 125 - 151
  • [5] Reducing the servers computation in private information retrieval: PIR with preprocessing
    Beimel, A
    Ishai, Y
    Malkin, T
    ADVANCES IN CRYPTOLOGY-CRYPTO 2000, PROCEEDINGS, 2000, 1880 : 55 - 73
  • [6] Reducing the Servers’ Computation in Private Information Retrieval: PIR with Preprocessing
    Amos Beimel
    Yuval Ishai
    Tal Malkin
    Journal of Cryptology, 2004, 17 : 125 - 151
  • [7] Lower Bounds for Kernelizations and Other Preprocessing Procedures
    Chen, Yijia
    Flum, Joerg
    Mueller, Moritz
    MATHEMATICAL THEORY AND COMPUTATIONAL PRACTICE, 2009, 5635 : 118 - +
  • [8] Lower Bounds for Kernelizations and Other Preprocessing Procedures
    Yijia Chen
    Jörg Flum
    Moritz Müller
    Theory of Computing Systems, 2011, 48 : 803 - 839
  • [9] Lower Bounds for Kernelizations and Other Preprocessing Procedures
    Chen, Yijia
    Flum, Joerg
    Mueller, Moritz
    THEORY OF COMPUTING SYSTEMS, 2011, 48 (04) : 803 - 839
  • [10] Lower-Bounds on Public-Key Operations in PIR
    Dujmovic, Jesko
    Hajiabadi, Mohammad
    ADVANCES IN CRYPTOLOGY, PT VII, EUROCRYPT 2024, 2024, 14657 : 65 - 87