Abstract : Picture the following scenario. Alice is looking for gold in California. What Alice does is look for a place with a little gold and follow the trace. Now, Alice wants to find gold in a place where no mining patent has been awarded, but many patents have been awarded in California during the gold rush. What Alice does is to walk around California with a GPS and a notebook computer. Whenever she finds a trace of gold she follows it querying if any patent has been awarded in that location. If she finds a trace of gold in a piece of land with no issued patent she can request the patent and start mining for gold. The problem is that she is worried that Bob's Mining Patents Inc., the service she queries the patents from, might cheat on her. Because Bob's knows she is looking for gold in California (Alice said so when signing up for Bob's service), he knows that, if she queries from some location, then there is gold there. So, if she queries a location and there is no patent awarded, Bob may run to the patent office and get the mining patent for that location. This Alice-and-Bob scenario is a basic motivation for Private Information Retrieval: a family of two-party protocols in which one of the parties owns a database, and the other wants to query it with certain privacy restrictions and warranties. Since the PIR problem was posed, different approaches to its solution have been pursued. In the following sections, we will present the general ideas of the variations and proposed solutions to the PIR problem. Then, we will present a collection of basic protocols that allow the implementation of a general-purpose PIR protocol. Finally, we will show details of a particular PIR protocol we have implemented.
[1]
Niv Gilboa,et al.
Computationally private information retrieval (extended abstract)
,
1997,
STOC '97.
[2]
Eyal Kushilevitz,et al.
Private information retrieval
,
1998,
JACM.
[3]
Moni Naor,et al.
Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions
,
1999,
J. Comput. Syst. Sci..
[4]
Moni Naor,et al.
Oblivious transfer and polynomial evaluation
,
1999,
STOC '99.
[5]
Moni Naor,et al.
Efficient oblivious transfer protocols
,
2001,
SODA '01.
[6]
Moni Naor,et al.
Oblivious Transfer with Adaptive Queries
,
1999,
CRYPTO.
[7]
Rafail Ostrovsky,et al.
Replication is not needed: single database, computationally-private information retrieval
,
1997,
Proceedings 38th Annual Symposium on Foundations of Computer Science.