ABSTRACT
We study the problem of private set intersection (PSI). In PSI, there are two entities, each storing a set ${\mathcal{P}_i}$, whose elements are picked from a finite set ${\mathbb{S}_K}$, on N<inf>i</inf> replicated and non-colluding databases. It is required to determine the set intersection ${\mathcal{P}_1} \cap {\mathcal{P}_2}$ without leaking any information about the remaining elements to the other entity. We first show that the PSI problem can be recast as a multi-message symmetric private information retrieval (MM-SPIR) problem. Next, as a stand-alone result, we show that the exact capacity of MM-SPIR is ${C_{MM - SPIR}} = 1 - \frac{1}{N}$ when P ≤ K − 1, if the common randomness S satisfies $H(S) \geq \frac{P}{{N - 1}}$ per desired symbol. This result implies that there is no gain for MM-SPIR over successive single-message SPIR. We present a novel capacity-achieving scheme which builds seamlessly over the multi-message PIR (MM-PIR) scheme. Based on this capacity result for the MM-SPIR problem, we show that the optimal download cost for the PSI problem is given by $\min \left\{ {\left[ {\begin{array}{c} {\frac{{{P_1}{N_2}}}{{{N_2} - 1}}} \end{array}} \right],\left[ {\begin{array}{c} {\frac{{{P_2}{N_1}}}{{{N_1} - 1}}} \end{array}} \right]} \right\}$, where P<inf>i</inf> is the cardinality of the set ${\mathcal{P}_i}$.
- [1]. . Efficient private matching and set intersection. In EUROCRYPT. Springer, 2004.
Google Scholar
- [2]. . Fast private set intersection from homomorphic encryption. In ACM SIGSAC CCS, 2017.
Google Scholar
- [3]. . Practical private set intersection protocols with linear complexity. In International Conference on Financial Cryptography and Data Security. Springer, January 2010.
Google Scholar
- [4]. . Private information retrieval. Journal of the ACM, 45(6):965-981, November1998.
Google Scholar
Digital Library
- [5]. . Protecting data privacy in private information retrieval schemes. In ACM STOC, May1998.
Google Scholar
- [6]. . The capacity of private information retrieval. IEEE Trans. on Info. Theory, 63(7):4075-4088, July2017.
Google Scholar
Digital Library
- [7]. . The capacity of symmetric private information retrieval. IEEE Trans. on Info. Theory, 65(1):322-329, January2019.
Google Scholar
Digital Library
- [8]. . The capacity of robust private information retrieval with colluding databases. IEEE Trans. on Info. Theory, 64(4):2361-2370, April2018.
Google Scholar
Cross Ref
- [9]. . Private information retrieval schemes for coded data with arbitrary collusion patterns. In IEEE ISIT, June2017.
Google Scholar
- [10]. . Staircase-PIR: Universally robust private information retrieval. In IEEE ITW, November2018.
Google Scholar
- [11]. . Symmetric private information retrieval for MDS coded distributed storage. In IEEE ICC, May2017.
Google Scholar
- [12]. . Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers. In IEEE ITW, November2017.
Google Scholar
- [13]. . Symmetric private information retrieval with mismatched coded messages and randomness. In IEEE ISIT, July2019.
Google Scholar
- [14]. . Secure symmetric private information retrieval from colluding databases with adversaries. In Allerton Conference, October 2017.
Google Scholar
- [15]. . On the information leakage in private information retrieval systems. IEEE Trans. on Info. Forensics and Security, 15:2999-3012, 2020.
Google Scholar
Cross Ref
- [16]. . The capacity of private information retrieval from coded databases. IEEE Trans. on Info. Theory, 64(3):1945-1956, March2018.
Google Scholar
Cross Ref
- [17]. . Private information retrieval from coded databases with colluding servers. SIAM Journal on Applied Algebra and Geometry, 1(1):647-664, November2017.
Google Scholar
Cross Ref
- [18]. . Achieving maximum distance separable private information retrieval capacity with linear codes. IEEE Trans. on Info. Theory, 65(7):4243-4273, July2019.
Google Scholar
Digital Library
- [19]. . Private information retrieval from MDS coded data with colluding servers: Settling a conjecture by Freij-HollantiIEEE Trans. on Info. Theory, 64(2):1000-1022, February2018.
Google Scholar
Digital Library
- [20]. . Multi-message private information retrieval: Capacity results and near-optimal schemes. IEEE Trans. on Info. Theory, 64(10):6842-6862, October2018.
Google Scholar
Cross Ref
- [21]. . The capacity of private information retrieval from Byzantine and colluding databases. IEEE Trans. on Info. Theory, 65(2):1206-1219, February2019.
Google Scholar
Digital Library
- [22]. . Private information retrieval from coded storage systems with colluding, Byzantine, and unresponsive servers. IEEE Trans. on Info. Theory, 65(6):3898-3906, June2019.
Google Scholar
Digital Library
- [23]. . The capacity of cache aided private information retrieval. In Allerton Conference, October 2017.
Google Scholar
- [24]. . Fundamental limits of cache-aided private information retrieval with unknown and uncoded prefetching. IEEE Trans. on Info. Theory, 65(5):3215-3232, May2019.
Google Scholar
Cross Ref
- [25]. . Cache-aided private information retrieval with partially known uncoded prefetching: Fundamental limits. IEEE JSAC, 36(6):1126-1139, June2018.
Google Scholar
- [26]. . Private information retrieval with side information: The single server case. In Allerton Conference, October 2017.
Google Scholar
- [27]. . The capacity of T-private information retrieval with private side information. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977919.
Google Scholar
Cross Ref
- [28]. . The capacity of private information retrieval with partially known private side information. IEEE Trans. on Info. Theory, 65(12):8222-8231, December2019.
Google Scholar
Digital Library
- [29]. . Multimessage private information retrieval with private side information. In IEEE ITW, November2018.
Google Scholar
- [30]. . On the capacity of single-server multi-message private information retrieval with side information. In Allerton Conference, October 2018.
Google Scholar
- [31]. . Single-server multi-message private information retrieval with side information. In Allerton Conference, October 2018.
Google Scholar
- [32]. . The capacity of private information retrieval with private side information under storage constraints. IEEE Trans. on Info. Theory, 66(4):2023-2031, April2020.
Google Scholar
Cross Ref
- [33]. . The capacity of private computation. IEEE Trans. on Info. Theory, 65(6):3880-3897, June2019.
Google Scholar
Digital Library
- [34]. . Private function retrieval. In IWCIT, April 2018.
Google Scholar
- [35]. . The asymptotic capacity of private search. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977082.
Google Scholar
Cross Ref
- [36]. . The capacity of private information retrieval from uncoded storage constrained databases. Available at arXiv:1805.04104.
Google Scholar
- [37]. . Improved storage for efficient private information retrieval. In IEEE ITW, August 2019.
Google Scholar
- [38]. . On the storage cost of private information retrieval. Available at arXiv:1910.11973.
Google Scholar
- [39]. . The capacity of private information retrieval from decentralized uncoded caching databases. Information, 10, December2019.
Google Scholar
- [40]. . The capacity of private information retrieval from heterogeneous uncoded caching databases. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2964762.
Google Scholar
Cross Ref
- [41]. . Private information retrieval from nonreplicated databases. In IEEE ISIT, July 2019.
Google Scholar
- [42]. . Private information retrieval through wiretap channel II: Privacy meets security. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977058.
Google Scholar
Digital Library
- [43]. . The capacity of private information retrieval with eavesdroppers. IEEE Trans. on Info. Theory, 65(5):3198-3214, May2019.
Google Scholar
- [44]. . Private information retrieval for secure distributed storage systems. IEEE Trans. on Info. Forensics and Security, 13(12):2953-2964, December2018.
Google Scholar
Digital Library
- [45]. . Cross subspace alignment and the asymptotic capacity of X-secure T-private information retrieval. IEEE Trans. on Info. Theory, 65(9):5783-5798, September2019.
Google Scholar
Digital Library
- [46]. . Optimal download cost of private information retrieval for arbitrary message length. IEEE Trans. on Info. Forensics and Security, 12(12):2920-2932, December2017.
Google Scholar
Digital Library
- [47]. . Capacity-achieving private information retrieval codes from MDS-coded databases with minimum message size. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977073.
Google Scholar
Cross Ref
- [48]. . Asymmetry hurts: Private information retrieval under asymmetric-traffic constraints. IEEE Trans. on Info. Theory, 65(11):7628-7645, November2019.
Google Scholar
Cross Ref
- [49]. . Noisy private information retrieval: On separability of channel coding and information retrieval. IEEE Trans. on Info. Theory, 65(12):8232-8249, December2019.
Google Scholar
Digital Library
- [50]. . One-shot PIR: Refinement and lifting. IEEE Trans. on Info. Theory, 66(4):2443-2455, April2020.
Google Scholar
Cross Ref
- [51]. . Private information retrieval over random linear networks. IEEE Trans. on Info. Forensics and Security, 15:790-799, 2020.
Google Scholar
Digital Library
- [52]. . Private set intersection: A multimessage symmetric private information retrieval perspective. Available at arXiv:1912.13501.
Google Scholar
- [53]. . Private information retrieval by keywords. IACR Cryptology ePrint Archive, 1997.
Google Scholar
Index Terms
- Private Set Intersection Using Multi-Message Symmetric Private Information Retrieval
Recommendations
Private Information Delivery
We introduce the problem of private information delivery (PID), comprised of <inline-formula> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula> messages, a user, and <inline-formula> <tex-math notation="LaTeX">$N$ </tex-math></inline-formula> ...
Differentially private generalized linear models revisited
NIPS '22: Proceedings of the 36th International Conference on Neural Information Processing SystemsWe study the problem of (ε, δ)-differentially private learning of linear predictors with convex losses. We provide results for two subclasses of loss functions. The first case is when the loss is smooth and non-negative but not necessarily Lipschitz (...
Comments