Quantcast
Channel: Cryptology ePrint Archive
Viewing all articles
Browse latest Browse all 30207

XPIR: Private Information Retrieval for Everyone, by Carlos Aguilar-Melchor and Joris Barrier and Laurent Fousse and Marc-Olivier Killijian

$
0
0
A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutually-distrustful replicated databases, trusted hardware, or cryptography. In this paper we focus on the later setting which is known as single-database computationally-Private Information Retrieval (cPIR). Classic cPIR protocols require that the database server executes an algorithm over all the database content at very low speeds which impairs their practical usage. In NDSS'07, given certain assumptions, realistic at the time, Sion and Carbunar showed that cPIR schemes were not practical and most likely would never be. To this day, this conclusion is widely accepted by researchers and practitioners. Using the paradigm shift introduced by lattice-based cryptography, we show that the conclusion of Sion and Carbunar is not valid anymore: cPIR is of practical value. This is achieved without compromising security, using standard encryption schemes, and conservative parameter choices. In order to prove this, we provide a fast and easy to use cPIR library and do a performance analysis, illustrated by use-cases, highlighting that cPIR is practical in a large span of situations. The library allows a server to process its data at a throughput ranging from 1 Gbps on a single core of a commodity CPU to almost 10 Gbps on a high-end processor using its multi-core capabilities. After replying to a first query (or through pre-computation), there is a x3 to x5 speedup for subsequent queries. The performance analysis shows for example that it is possible to privately receive an HD movie from a Netflix-like database (with 35K movies) with enough throughput to watch it in real time, or to build a sniffer over a Gbit link with an obfuscated code that hides what it is sniffing. This library is modular, allowing alternative homomorphic encryption modules to be plugged-in. We provide a slow but compact number theory crypto module that uses Paillier encryption, and a fast crypto module with Ring-LWE based encryption. The library has an auto-optimizer that chooses the best protocol parameters (recursion level, aggregation) and crypto parameters for a given setting. This greatly simplifies its usage for non-specialists. Given the complexity of parameter settings in lattice-based homomorphic encryption and the fact that cPIR adds a second layer of choices that interact with crypto parameter settings, we believe this auto-optimizer will also be useful to specialists.

Viewing all articles
Browse latest Browse all 30207

Trending Articles