Committed private information retrieval

Quang Cao, Hong Yen Tran, Son Hoang Dau, Xun Yi, Emanuele Viterbo, Chen Feng, Yu Chih Huang, Jingge Zhu, Stanislav Kruglik, Han Mao Kiah

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

Abstract

A private information retrieval (PIR) scheme allows a client to retrieve a data item xi among n items x1, x2, …, xn from k servers, without revealing what i is even when t< k servers collude and try to learn i. Such a PIR scheme is said to be t-private. A PIR scheme is v-verifiable if the client can verify the correctness of the retrieved xi even when v≤ k servers collude and try to fool the client by sending manipulated data. Most of the previous works in the literature on PIR assumed that v< k, leaving the case of all-colluding servers open. We propose a generic construction that combines a linear map commitment (LMC) and an arbitrary linear PIR scheme to produce a k-verifiable PIR scheme, termed a committed PIR scheme. Such a scheme guarantees that even in the worst scenario, when all servers are under the control of an attacker, although the privacy is unavoidably lost, the client won’t be fooled into accepting an incorrect xi. We demonstrate the practicality of our proposal by implementing the committed PIR schemes based on the Lai-Malavolta LMC and three well-known PIR schemes using the GMP library and blst, the current fastest C library for elliptic curve pairings.

Original languageEnglish
Title of host publicationComputer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security The Hague, The Netherlands, September 25–29, 2023 Proceedings, Part I
EditorsGene Tsudik, Mauro Conti, Kaitai Liang, Georgios Smaragdakis
Place of PublicationCham Switzerland
PublisherSpringer
Pages393-413
Number of pages21
ISBN (Electronic)9783031505942
ISBN (Print)9783031505935
DOIs
Publication statusPublished - 2024
EventEuropean Symposium on Research in Computer Security 2023 - The Hague, Netherlands
Duration: 25 Sept 202329 Sept 2023
Conference number: 28th
https://link.springer.com/book/10.1007/978-3-031-50594-2 (Proceedings)
https://esorics2023.org (Website)

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume14344
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceEuropean Symposium on Research in Computer Security 2023
Abbreviated titleESORICS 2023
Country/TerritoryNetherlands
CityThe Hague
Period25/09/2329/09/23
Internet address

Keywords

  • commitment scheme
  • elliptic curve
  • malicious server
  • pairing
  • Private information retrieval
  • verifiability

Cite this