Querying twice to achieve information-theoretic verifiability in private information retrieval
Private Information Retrieval (PIR) protocols allow a client to retrieve any file of interest while keeping the files identity hidden from the database servers. While many existing PIR protocols assume servers to be honest but curious, we investigate the scenario of dishonest servers that provide in...
Saved in:
Main Authors: | , , , , |
---|---|
Other Authors: | |
Format: | Article |
Language: | English |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/180554 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-180554 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-1805542024-10-14T15:35:23Z Querying twice to achieve information-theoretic verifiability in private information retrieval Kruglik, Stanislav Dau, Son Hoang Kiah, Han Mao Wang, Huaxiong Zhang, Liang Feng School of Physical and Mathematical Sciences Physics Private information retrieval Security Private Information Retrieval (PIR) protocols allow a client to retrieve any file of interest while keeping the files identity hidden from the database servers. While many existing PIR protocols assume servers to be honest but curious, we investigate the scenario of dishonest servers that provide incorrect answers to mislead clients into obtaining wrong results. We propose a unified framework for polynomial PIR protocols encompassing various existing protocols that optimize the download rate or total communication cost. We introduce a way to transform a polynomial PIR to a verifiable one without increasing the number of involved servers by doubling the queries. The security guarantees can be information-theoretic or computational, and the verification keys can be public or private. Moreover, in one of our protocols, the ratio between the additional download overhead associated with verification and the normal download cost approaches zero as the file size goes to infinity. Info-communications Media Development Authority (IMDA) Ministry of Education (MOE) National Research Foundation (NRF) Submitted/Accepted version This research / project is supported by the National Research Foundation, Singapore and Infocomm Media Development Authority under its Trust Tech Funding Initiative, Singapore Ministry of Education Academic Research Fund Tier 2 Grant T2EP20121-0007, Australia Research Council DECRA Grant DE180100768 and DP Grant DP200100731, National Natural Science Foundation of China Grant No. 62372299 and the Natural Science Foundation of Shanghai Grant No. 21ZR1443000. 2024-10-11T07:11:45Z 2024-10-11T07:11:45Z 2024 Journal Article Kruglik, S., Dau, S. H., Kiah, H. M., Wang, H. & Zhang, L. F. (2024). Querying twice to achieve information-theoretic verifiability in private information retrieval. IEEE Transactions On Information Forensics and Security, 19, 8172-8187. https://dx.doi.org/10.1109/TIFS.2024.3453550 1556-6013 https://hdl.handle.net/10356/180554 10.1109/TIFS.2024.3453550 2-s2.0-85203647652 19 8172 8187 en T2EP20121-0007 IEEE Transactions on Information Forensics and Security © 2024 IEEE. All rights reserved. This article may be downloaded for personal use only. Any other use requires prior permission of the copyright holder. The Version of Record is available online at http://doi.org/10.1109/TIFS.2024.3453550. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
Physics Private information retrieval Security |
spellingShingle |
Physics Private information retrieval Security Kruglik, Stanislav Dau, Son Hoang Kiah, Han Mao Wang, Huaxiong Zhang, Liang Feng Querying twice to achieve information-theoretic verifiability in private information retrieval |
description |
Private Information Retrieval (PIR) protocols allow a client to retrieve any file of interest while keeping the files identity hidden from the database servers. While many existing PIR protocols assume servers to be honest but curious, we investigate the scenario of dishonest servers that provide incorrect answers to mislead clients into obtaining wrong results. We propose a unified framework for polynomial PIR protocols encompassing various existing protocols that optimize the download rate or total communication cost. We introduce a way to transform a polynomial PIR to a verifiable one without increasing the number of involved servers by doubling the queries. The security guarantees can be information-theoretic or computational, and the verification keys can be public or private. Moreover, in one of our protocols, the ratio between the additional download overhead associated with verification and the normal download cost approaches zero as the file size goes to infinity. |
author2 |
School of Physical and Mathematical Sciences |
author_facet |
School of Physical and Mathematical Sciences Kruglik, Stanislav Dau, Son Hoang Kiah, Han Mao Wang, Huaxiong Zhang, Liang Feng |
format |
Article |
author |
Kruglik, Stanislav Dau, Son Hoang Kiah, Han Mao Wang, Huaxiong Zhang, Liang Feng |
author_sort |
Kruglik, Stanislav |
title |
Querying twice to achieve information-theoretic verifiability in private information retrieval |
title_short |
Querying twice to achieve information-theoretic verifiability in private information retrieval |
title_full |
Querying twice to achieve information-theoretic verifiability in private information retrieval |
title_fullStr |
Querying twice to achieve information-theoretic verifiability in private information retrieval |
title_full_unstemmed |
Querying twice to achieve information-theoretic verifiability in private information retrieval |
title_sort |
querying twice to achieve information-theoretic verifiability in private information retrieval |
publishDate |
2024 |
url |
https://hdl.handle.net/10356/180554 |
_version_ |
1814777775220850688 |