Doubly-efficient PIR (DEPIR)

Double efficient PIR is a type of single-server PIR that allows the database to be preprocessed before the client queries the data. A PIR is considered a DEPIR if both the communication and computation at query time is , where is the size of the database. The three main variants of DEPIR are: secret-key, public-key, and unkeyed. Note that any unkeyed DEPIR is trivially a PK-DEPIR which is trivially an SK-DEPIR. The latter keyed variants of DEPIR were introduced by Introduced by BIPW17.

Definition

A (one-round) doubly-efficient private information retrieval (DEPIR) scheme is a tuple of efficient algorithms with respect to a key space such that

  • , is a randomized algorithm that takes a security parameter and database , and outputs an encoded database and (optionally, see variations) a key ,
  • , is a randomized algorithm that takes (optionally) a key and index , and outputs and a hint ,
  • , is a randomized algorithm that takes a query and database , and outputs a response ,
  • , is a randomized algorithm that takes a hint and response , and outputs an answer .

Correctness

A DEPIR scheme is correct if for every , database , and index ,

(Unkeyed/Standard) DEPIR

By default DEPIR scheme outputs no key i.e. with probability . The security of this scheme is the same as either game below, which are equivalent when is set to .

Public-key DEPIR

The privacy advantage of an adversary that outputs database and indices and is defined as where , , and .

Secret-key DEPIR

In secret-key DEPIR, the privacy advantage is relaxed to, where is not given access to the key as follows, where , , and .

Other results

  • Unkeyed DEPIR can be built with server storage and online computation and bandwidth from LWE — LMW23
  • Many cryptographic primitives cannot be used to construct SK-DEPIR in a black-box way, unless OWF can be used to construct DEPIR in a black-box way — LMW25
  • SK-DEPIR can be built from a non-standard assumption — BIPW17
    • This was analyzed further in BHMW21, which didn’t break the core assumption but broke the generalized proposed assumption

Multi-server DEPIR

TODO