Repudiative information retrieval

Privacy is preserved while retrieving an <i>i</i>-th record from the database of <i>N</i> records if no information is revealed about <i>i</i>, not even to the database server. Repudiation is preserved in the same model if no one can prove, even in cooperation with the server, that a record retrieved is or is not the <i>j</i>-th record for any 1 ≤ <i>j</i> ≤ <i>N</i>. The first problem is called PIR, and we call the second problem the RIR problem.State of the art PIR protocols with optimal query response time and optimal communication require heavy periodical preprocessing. <i>O</i>(<i>N</i> log <i>N</i>) I/O's are required for preprocessing before answering a query.In this paper, we reduce preprocessing complexity by weakening PIR to RIR. In particular, we propose a RIR protocol with optimal query response time and communication, and <i>O</i> (√<i>N</i>) preprocessing per query.

[1]  Alison L Gibbs,et al.  On Choosing and Bounding Probability Metrics , 2002, math/0209021.

[2]  Eyal Kushilevitz,et al.  Private information retrieval , 1995, Proceedings of IEEE 36th Annual Foundations of Computer Science.

[3]  Sean W. Smith,et al.  Practical server privacy with secure coprocessors , 2001, IBM Syst. J..

[4]  Paul F. Syverson,et al.  Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.

[5]  Rafail Ostrovsky,et al.  Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..

[6]  Vitaly Shmatikov,et al.  Probabilistic analysis of anonymity , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.

[7]  Johann-Christoph Freytag,et al.  Almost Optimal Private Information Retrieval , 2002, Privacy Enhancing Technologies.

[8]  Markus Jakobsson,et al.  Security of Signed ElGamal Encryption , 2000, ASIACRYPT.

[9]  Dmitri Asonov Private Information Retrieval – An Overview and Current Trends , 2001 .

[10]  Sean W. Smith,et al.  Building a high-performance, programmable secure coprocessor , 1999, Comput. Networks.

[11]  Bart Preneel,et al.  Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.

[12]  David R. Safford,et al.  Practical Private Information Retrieval with Secure Coprocessors , 2000 .

[13]  Robert H. Deng,et al.  An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods , 2000, ICISC.

[14]  Aggelos Kiayias,et al.  Secure Games with Polynomial Expressions , 2001, ICALP.

[15]  Rafail Ostrovsky,et al.  Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.

[16]  Johann-Christoph Freytag Private Information Retrieval, Optimal for Users and Secure Coprocessors , 2002 .

[17]  George Danezis,et al.  Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.

[18]  Sean W. Smith,et al.  Using a High-Performance, Programmable Secure Coprocessor , 1998, Financial Cryptography.

[19]  Silvio Micali,et al.  Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.