Arrow Research search
Back to FOCS

FOCS 1995

Private Information Retrieval

Conference Paper Accepted Paper Algorithms and Complexity ยท Theoretical Computer Science

Abstract

We describe schemes that enable a user to access k replicated copies of a database (k/spl ges/2) and privately retrieve information stored in the database. This means that each individual database gets no information on the identity of the item retrieved by the user. For a single database, achieving this type of privacy requires communicating the whole database, or n bits (where n is the number of bits in the database). Our schemes use the replication to gain substantial saving. In particular, we have: A two database scheme with communication complexity of O(n/sup 1/3/). A scheme for a constant number, k, of databases with communication complexity O(n/sup 1/k/). A scheme for 1/3 log/sub 2/ n databases with polylogarithmic (in n) communication complexity.

Authors

Keywords

  • Information retrieval
  • Complexity theory
  • Data privacy
  • Protection
  • Distributed databases
  • Private Information Retrieval
  • Complex Strategies
  • Complex Communication
  • Database Schema
  • General Case
  • Elements
  • Basic Scheme
  • Polynomial Of Degree
  • Binary String
  • Codeword
  • User Privacy
  • Lexicographic
  • Finite Field
  • Number Of Databases
  • Coding Theory
  • Polynomial Interpolation
  • Balancing Techniques
  • Total Communication
  • Prime Power
  • N Blocks
  • T Point

Context

Venue
IEEE Symposium on Foundations of Computer Science
Archive span
1975-2025
Indexed papers
3809
Paper id
699855513064774608