Introduction

Retrieving information from databases pulls a constant activity on the daily routine, concurrently, its privacy concern when it comes to sensitive data develop a parallel problem. Private information retrieval (PIR) is a privacy protocol that allows a user to download a required message from a set of messages stored in a database without revealing the index of the required message to the databases.

In other words, PIR is protocol in which from one side, a possibly untrusted server holds a public database $DB$ with $N$ records. On the other side, a client wants to query for record $i \in {0 \cdots N-1}$, without letting the server learn the queried item they are looking up (and, hence, learning the value $v$ associated with $i$ they are interested in). A naive solution involves the client locally downloading the whole $DB$, but that can be expensive: the goal of PIR is to both preserve privacy and be more efficient than the total cost of downloading the whole $DB$. There are many proposed solutions for this problem, and for this Capstone Project, we will explore the ones that use Fully Homomorphic Encryption (FHE) as a cryptographic primitive.

Preliminaries and Fundamentals

Stateful Private Information Retrieval

It is important to note that the PIR interaction is divided into two parts: (1) offline query-independent and (2) online query-dependent.

FrodoPIR Original Scheme

The protocol consists of 5 parts, where:

FrodoPIR overview

Objectives

The goal of the project approach is to reduce the computational cost of the online query processing, allowing the client to deal with multiple indices simultaneously. By structuring the database as a $\sqrt{m} \times \sqrt{m}$ matrix $D$, each cell representing a different element in $DB$, the client sends then two query vectors $v_{\text{row}}$ and $v_{\text{col}}$, each of size $\sqrt{m}$. The server then computes matrix-vector products to obtain the given entries.

You can download the document here!

book2

>> Home