Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/ISIT44484.2020.9174221guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
research-article

Private Set Intersection Using Multi-Message Symmetric Private Information Retrieval

Authors Info & Claims
Published:21 June 2020Publication History

ABSTRACT

We study the problem of private set intersection (PSI). In PSI, there are two entities, each storing a set ${\mathcal{P}_i}$, whose elements are picked from a finite set ${\mathbb{S}_K}$, on N<inf>i</inf> replicated and non-colluding databases. It is required to determine the set intersection ${\mathcal{P}_1} \cap {\mathcal{P}_2}$ without leaking any information about the remaining elements to the other entity. We first show that the PSI problem can be recast as a multi-message symmetric private information retrieval (MM-SPIR) problem. Next, as a stand-alone result, we show that the exact capacity of MM-SPIR is ${C_{MM - SPIR}} = 1 - \frac{1}{N}$ when P &#x2264; K &#x2212; 1, if the common randomness S satisfies $H(S) \geq \frac{P}{{N - 1}}$ per desired symbol. This result implies that there is no gain for MM-SPIR over successive single-message SPIR. We present a novel capacity-achieving scheme which builds seamlessly over the multi-message PIR (MM-PIR) scheme. Based on this capacity result for the MM-SPIR problem, we show that the optimal download cost for the PSI problem is given by $\min \left\{ {\left[ {\begin{array}{c} {\frac{{{P_1}{N_2}}}{{{N_2} - 1}}} \end{array}} \right],\left[ {\begin{array}{c} {\frac{{{P_2}{N_1}}}{{{N_1} - 1}}} \end{array}} \right]} \right\}$, where P<inf>i</inf> is the cardinality of the set ${\mathcal{P}_i}$.

References

  1. [1].Freedman M., Nissim K., and Pinkas B.. Efficient private matching and set intersection. In EUROCRYPT. Springer, 2004. Google ScholarGoogle Scholar
  2. [2].Chen H., Laine K., and Rindal P.. Fast private set intersection from homomorphic encryption. In ACM SIGSAC CCS, 2017. Google ScholarGoogle Scholar
  3. [3].De Cristofaro E. and Tsudik G. . Practical private set intersection protocols with linear complexity. In International Conference on Financial Cryptography and Data Security. Springer, January 2010. Google ScholarGoogle Scholar
  4. [4].Chor B., Kushilevitz E., Goldreich O., and Sudan M.. Private information retrieval. Journal of the ACM, 45(6):965-981, November1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5].Gertner Y., Ishai Y., Kushilevitz E., and Malkin T.. Protecting data privacy in private information retrieval schemes. In ACM STOC, May1998. Google ScholarGoogle Scholar
  6. [6].Sun H. and Jafar S. A. . The capacity of private information retrieval. IEEE Trans. on Info. Theory, 63(7):4075-4088, July2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7].Sun H. and Jafar S. A. . The capacity of symmetric private information retrieval. IEEE Trans. on Info. Theory, 65(1):322-329, January2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8].Sun H. and Jafar S. A. . The capacity of robust private information retrieval with colluding databases. IEEE Trans. on Info. Theory, 64(4):2361-2370, April2018. Google ScholarGoogle ScholarCross RefCross Ref
  9. [9].Tajeddine R., Gnilke O. W., Karpuk D., Freij-Hollanti R., Hollanti C., and El Rouayheb S.. Private information retrieval schemes for coded data with arbitrary collusion patterns. In IEEE ISIT, June2017. Google ScholarGoogle Scholar
  10. [10].Bitar R. and El Rouayheb S.. Staircase-PIR: Universally robust private information retrieval. In IEEE ITW, November2018. Google ScholarGoogle Scholar
  11. [11].Wang Q. and Skoglund M. . Symmetric private information retrieval for MDS coded distributed storage. In IEEE ICC, May2017. Google ScholarGoogle Scholar
  12. [12].Wang Q. and Skoglund M. . Linear symmetric private information retrieval for MDS coded distributed storage with colluding servers. In IEEE ITW, November2017. Google ScholarGoogle Scholar
  13. [13].Wang Q., Sun H., and Skoglund M.. Symmetric private information retrieval with mismatched coded messages and randomness. In IEEE ISIT, July2019. Google ScholarGoogle Scholar
  14. [14].Wang Q. and Skoglund M. . Secure symmetric private information retrieval from colluding databases with adversaries. In Allerton Conference, October 2017. Google ScholarGoogle Scholar
  15. [15].Guo T., Zhou R., and Tian C.. On the information leakage in private information retrieval systems. IEEE Trans. on Info. Forensics and Security, 15:2999-3012, 2020. Google ScholarGoogle ScholarCross RefCross Ref
  16. [16].Banawan K. and Ulukus S. . The capacity of private information retrieval from coded databases. IEEE Trans. on Info. Theory, 64(3):1945-1956, March2018. Google ScholarGoogle ScholarCross RefCross Ref
  17. [17].Freij-Hollanti R., Gnilke O., Hollanti C., and Karpuk D.. Private information retrieval from coded databases with colluding servers. SIAM Journal on Applied Algebra and Geometry, 1(1):647-664, November2017. Google ScholarGoogle ScholarCross RefCross Ref
  18. [18].Kumar S., Lin H.-Y., Rosnes E., and Amat A. G. i. Achieving maximum distance separable private information retrieval capacity with linear codes. IEEE Trans. on Info. Theory, 65(7):4243-4273, July2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19].Sun H. and Jafar S. A. et al. . Private information retrieval from MDS coded data with colluding servers: Settling a conjecture by Freij-HollantiIEEE Trans. on Info. Theory, 64(2):1000-1022, February2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20].Banawan K. and Ulukus S. . Multi-message private information retrieval: Capacity results and near-optimal schemes. IEEE Trans. on Info. Theory, 64(10):6842-6862, October2018. Google ScholarGoogle ScholarCross RefCross Ref
  21. [21].Banawan K. and Ulukus S. . The capacity of private information retrieval from Byzantine and colluding databases. IEEE Trans. on Info. Theory, 65(2):1206-1219, February2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. [22].Tajeddine R., Gnilke O. W., Karpuk D., Freij-Hollanti R., and Hollanti C.. Private information retrieval from coded storage systems with colluding, Byzantine, and unresponsive servers. IEEE Trans. on Info. Theory, 65(6):3898-3906, June2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. [23].Tandon R.. The capacity of cache aided private information retrieval. In Allerton Conference, October 2017. Google ScholarGoogle Scholar
  24. [24].Wei Y.-P., Banawan K., and Ulukus S.. Fundamental limits of cache-aided private information retrieval with unknown and uncoded prefetching. IEEE Trans. on Info. Theory, 65(5):3215-3232, May2019. Google ScholarGoogle ScholarCross RefCross Ref
  25. [25].Wei Y.-P., Banawan K., and Ulukus S.. Cache-aided private information retrieval with partially known uncoded prefetching: Fundamental limits. IEEE JSAC, 36(6):1126-1139, June2018. Google ScholarGoogle Scholar
  26. [26].Kadhe S., Garcia B., Heidarzadeh A., El Rouayheb S., and Sprintson A.. Private information retrieval with side information: The single server case. In Allerton Conference, October 2017. Google ScholarGoogle Scholar
  27. [27].Chen Z., Wang Z., and Jafar S.. The capacity of T-private information retrieval with private side information. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977919. Google ScholarGoogle ScholarCross RefCross Ref
  28. [28].Wei Y.-P., Banawan K., and Ulukus S.. The capacity of private information retrieval with partially known private side information. IEEE Trans. on Info. Theory, 65(12):8222-8231, December2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29].Shariatpanahi S. P., Siavoshani M. J., and Maddah-Ali M. A.. Multimessage private information retrieval with private side information. In IEEE ITW, November2018. Google ScholarGoogle Scholar
  30. [30].Heidarzadeh A., Garcia B., Kadhe S., Rouayheb S. E., and Sprintson A.. On the capacity of single-server multi-message private information retrieval with side information. In Allerton Conference, October 2018. Google ScholarGoogle Scholar
  31. [31].Li S. and Gastpar M. . Single-server multi-message private information retrieval with side information. In Allerton Conference, October 2018. Google ScholarGoogle Scholar
  32. [32].Wei Y.-P. and Ulukus S.. The capacity of private information retrieval with private side information under storage constraints. IEEE Trans. on Info. Theory, 66(4):2023-2031, April2020. Google ScholarGoogle ScholarCross RefCross Ref
  33. [33].Sun H. and Jafar S. A. . The capacity of private computation. IEEE Trans. on Info. Theory, 65(6):3880-3897, June2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. [34].Mirmohseni M. and Maddah-Ali M. A. . Private function retrieval. In IWCIT, April 2018. Google ScholarGoogle Scholar
  35. [35].Chen Z., Wang Z., and Jafar S.. The asymptotic capacity of private search. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977082. Google ScholarGoogle ScholarCross RefCross Ref
  36. [36].Attia M. A., Kumar D., and Tandon R.. The capacity of private information retrieval from uncoded storage constrained databases. Available at arXiv:1805.04104. Google ScholarGoogle Scholar
  37. [37].Banawan K., Arasli B., and Ulukus S.. Improved storage for efficient private information retrieval. In IEEE ITW, August 2019. Google ScholarGoogle Scholar
  38. [38].Tian C.. On the storage cost of private information retrieval. Available at arXiv:1910.11973. Google ScholarGoogle Scholar
  39. [39].Wei Y.-P., Arasli B., Banawan K., and Ulukus S.. The capacity of private information retrieval from decentralized uncoded caching databases. Information, 10, December2019. Google ScholarGoogle Scholar
  40. [40].Banawan K., Arasli B., Wei Y.-P., and Ulukus S.. The capacity of private information retrieval from heterogeneous uncoded caching databases. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2964762. Google ScholarGoogle ScholarCross RefCross Ref
  41. [41].Banawan K. and Ulukus S. . Private information retrieval from nonreplicated databases. In IEEE ISIT, July 2019. Google ScholarGoogle Scholar
  42. [42].Banawan K. and Ulukus S. . Private information retrieval through wiretap channel II: Privacy meets security. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977058. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. [43].Wang Q., Sun H., and Skoglund M.. The capacity of private information retrieval with eavesdroppers. IEEE Trans. on Info. Theory, 65(5):3198-3214, May2019. Google ScholarGoogle Scholar
  44. [44].Yang H., Shin W., and Lee J.. Private information retrieval for secure distributed storage systems. IEEE Trans. on Info. Forensics and Security, 13(12):2953-2964, December2018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45].Jia Z., Sun H., and Jafar S.. Cross subspace alignment and the asymptotic capacity of X-secure T-private information retrieval. IEEE Trans. on Info. Theory, 65(9):5783-5798, September2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46].Sun H. and Jafar S. A. . Optimal download cost of private information retrieval for arbitrary message length. IEEE Trans. on Info. Forensics and Security, 12(12):2920-2932, December2017. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. [47].Zhou R., Tian C., Sun H., and Liu T.. Capacity-achieving private information retrieval codes from MDS-coded databases with minimum message size. IEEE Trans. on Info. Theory. doi: 10.1109/TIT.2020.2977073. Google ScholarGoogle ScholarCross RefCross Ref
  48. [48].Banawan K. and Ulukus S. . Asymmetry hurts: Private information retrieval under asymmetric-traffic constraints. IEEE Trans. on Info. Theory, 65(11):7628-7645, November2019. Google ScholarGoogle ScholarCross RefCross Ref
  49. [49].Banawan K. and Ulukus S. . Noisy private information retrieval: On separability of channel coding and information retrieval. IEEE Trans. on Info. Theory, 65(12):8232-8249, December2019. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. [50].D’Oliveira R. G. L. and El Rouayheb S.. One-shot PIR: Refinement and lifting. IEEE Trans. on Info. Theory, 66(4):2443-2455, April2020. Google ScholarGoogle ScholarCross RefCross Ref
  51. [51].Tajeddine R., Wachter-Zeh A., and Hollanti C.. Private information retrieval over random linear networks. IEEE Trans. on Info. Forensics and Security, 15:790-799, 2020. Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. [52].Wang Z., Banawan K., and Ulukus S.. Private set intersection: A multimessage symmetric private information retrieval perspective. Available at arXiv:1912.13501. Google ScholarGoogle Scholar
  53. [53].Chor B., Gilboa N., and Naor M.. Private information retrieval by keywords. IACR Cryptology ePrint Archive, 1997. Google ScholarGoogle Scholar

Index Terms

  1. Private Set Intersection Using Multi-Message Symmetric Private Information Retrieval
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image Guide Proceedings
          2020 IEEE International Symposium on Information Theory (ISIT)
          Jun 2020
          3072 pages

          Copyright © 2020

          Publisher

          IEEE Press

          Publication History

          • Published: 21 June 2020

          Qualifiers

          • research-article
        • Article Metrics

          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0

          Other Metrics