single database private information retrieval 07 11 2005
play

Single-Database Private Information Retrieval 07.11.2005 Aleksandr - PowerPoint PPT Presentation

MTAT.07.006 Research Seminar in Cryptography Single-Database Private Information Retrieval 07.11.2005 Aleksandr Grebennik Tartu University a g@ut.ee Single-Database Private Information Retrieval Aleksandr Grebennik 1 Overview of the Lecture


  1. MTAT.07.006 Research Seminar in Cryptography Single-Database Private Information Retrieval 07.11.2005 Aleksandr Grebennik Tartu University a g@ut.ee Single-Database Private Information Retrieval Aleksandr Grebennik 1

  2. Overview of the Lecture • CMS - first single database private information retrieval scheme • Gentry-Ramzan PBR • Lipmaa Oblivious Transfer Protocol with Log-Squared Communication Single-Database Private Information Retrieval Aleksandr Grebennik 2

  3. PIR, PBR • PIR - allows a user to retrieve the i th bit of an n -bit database, without revealing the value of index i to the database. • PBR - natural and more practical extension of PIR in which, instead of retrieving only a single bit, the user retrieves a i th block with d bits in it. Single-Database Private Information Retrieval Aleksandr Grebennik 3

  4. CMS - first single-database PIR • Proposed by Cachin, Micali and Stadler in 1999 • Based on “ Φ - hiding” assumption (that it is hard to distinguish which of two primes divide φ ( m ) for composite modulus m ). • Communication complexity is about O (log 8 n ) per bit. Single-Database Private Information Retrieval Aleksandr Grebennik 4

  5. CMS - first single-database PIR, slide 2 • Each index j ∈ [1 , n ] is mapped to a distinct prime p j . • Query for bit b i : hard-to-factor modulus m so that p i | φ ( m ) and a gen- erator x ∈ Z ∗ m . j p b j • Server response: r = x P mod m , where P = � j • Response retrieval: ∃ y : y p i ≡ r (mod m ) ⇔ b i = 1 Single-Database Private Information Retrieval Aleksandr Grebennik 5

  6. Gentry-Ramzan private block retrieval scheme • Published in 2005 • Uses the fact that discrete logarithm computation is feasible in hid- den subgroups of smooth order, while this task is still hard in general groups. (A number is called smooth if it has only small prime factors) Single-Database Private Information Retrieval Aleksandr Grebennik 6

  7. Gentry-Ramzan private block retrieval scheme, slide 2 • The server partitions the n -bit database B into t blocks B = C 1 � C 2 � . . . � C t of size at most ℓ bits. • S = { p 1 , . . . , p t } is a set of small distinct prime numbers. • Each block C i is associated to a prime power π i ( π i = p c i i , where c i is the smallest integer so that p c i i ≥ 2 ℓ ) • All parameters above are public. Single-Database Private Information Retrieval Aleksandr Grebennik 7

  8. Gentry-Ramzan private block retrieval scheme, slide 3 • Server precomputes an integer e that satisfies e ≡ C i (mod π i ) using Chinese Remainder Theorem. • To retrieve C i it suffices to retrieve e mod π i . Single-Database Private Information Retrieval Aleksandr Grebennik 8

  9. Gentry-Ramzan private block retrieval scheme, slide 4 • To query for block C i , the user generates an appropriate cyclic group G = � g � with order | G | = qπ i for some suitable integer q and sends ( G, g ) to server, keeping q private. • Example: an Z ∗ m group, where m is constructed to Φ - hide π i . ⋆ m = Q 0 Q 1 , where Q 0 , Q 1 are safe primes: Q 0 = 2 q 0 π i + 1 , Q 1 = 2 q 1 d + 1 ; q 0 , q 1 are primes. • Notice that G contains a subgroup H of smooth order π i , and that h = g q is a generator of H . Single-Database Private Information Retrieval Aleksandr Grebennik 9

  10. Gentry-Ramzan private block retrieval scheme, slide 5 • Server responds with g e = g e ∈ G • The user obtains e mod π i by setting h e = g q e ∈ H and performing a (tractable) discrete logarithm computation log h h e , which occurs en- tirely in the subgroup H of order p c i i and can be quite efficient if p i is small. • To prove that log h h e = C i , let’s rewrite e ≡ e π i (mod π i ) as e = e π i + π i · E , for some E ∈ Z . Now: e = g |� g �| /π i • h e = g q = g e |� g �| /π i = g e πi |� g �| /π i g E |� g �| = g e πi |� g �| /π i = e h e πi . Single-Database Private Information Retrieval Aleksandr Grebennik 10

  11. Gentry-Ramzan private block retrieval scheme, slide 6 • Pohlig-Hellman algorithm • let’s write C i = log h h e in base p i (remember that C i is a number modulo p c i i ): C i = x 0 + x 1 p + . . . x c − 1 p c − 1 , 0 ≤ x i < p Single-Database Private Information Retrieval Aleksandr Grebennik 11

  12. Gentry-Ramzan private block retrieval scheme, slide 7 • Computational complexity √ ⋆ Querier side: no more than 4 nℓ group operations. ⋆ Server side: Θ( n ) group operations. • Communication complexity ⋆ Suppose that the group G and any element of G can be described in ℓ G bits. Then the total complexity is 3 ℓ G bits. Single-Database Private Information Retrieval Aleksandr Grebennik 12

  13. Lipmaa PIR protocol with log-squared communication • first published in 2004 • Takes advantage of the concept of length-flexible additively homomor- phic (LFAH) public-key cryptosystems. ⋆ Length-flexible public-key cryptosystem has an additional length parameter s ∈ Z + . The encryption algorithm maps sk -bit plain- texts, for any s and for security parameter k , to ( s + ξ ) k -bit cipher- texts for some small integer ξ ≥ q . Single-Database Private Information Retrieval Aleksandr Grebennik 13

  14. Lipmaa PIR protocol with log-squared communication • Communication complexity ⋆ Θ( k log 2 n + ℓ log n ) ⋆ k = Ω( log 3 − o (1) n ) ; • Computational complexity ⋆ Sender’s work is equivalent to Θ( nl ) · k 2+ o (1) bit operations; ⋆ Receiver’s work is Θ(( k · log n + l ) 2+ o (1) ) Single-Database Private Information Retrieval Aleksandr Grebennik 14

  15. Lipmaa PIR protocol with log-squared communication • Communication complexity ⋆ The ratio of amount of bits transferred to the communication com- plexity is 1 / (log n ) ⋆ to achieve a good rate in practice, n and ℓ must be quite large (on the order of gigabits and megabits, respectively), before they begin to offset the large one-time cost represented by the k log 2 n term. • Computational complexity ⋆ Sender’s work is equivalent to Θ( nl ) · k 2+ o (1) bit operations; ⋆ Receiver’s work is Θ(( k · log n + l ) 2+ o (1) ) Single-Database Private Information Retrieval Aleksandr Grebennik 15

Recommend


More recommend