In cryptography, a private information retrieval (PIR) protocol is a protocol that allows a user to retrieve an item from a server in possession of a database without revealing which item is retrieved. PIR is a weaker version of 1-out-of-n oblivious transfer, where it is also required that the user should not get information about other database items.
One trivial, but very inefficient way to achieve PIR is for the server to send an entire copy of the database to the user. In fact, this is the only possible protocol (in the classical or the quantum setting[1]) that gives the user information theoretic privacy for their query in a single-server setting.[2] There are two ways to address this problem: make the server computationally bounded or assume that there are multiple non-cooperating servers, each having a copy of the database.
The problem was introduced in 1995 by Chor, Goldreich, Kushilevitz and Sudan[2] in the information-theoretic setting and in 1997 by Kushilevitz and Ostrovsky in the computational setting.[3] Since then, very efficient solutions have been discovered. Single database (computationally private) PIR can be achieved with constant (amortized) communication and k-database (information theoretic) PIR can be done with communication.
^Baumeler, Ämin; Broadbent, Anne (17 April 2014). "Quantum Private Information Retrieval has Linear Communication Complexity". Journal of Cryptology. 28: 161–175. arXiv:1304.5490. doi:10.1007/s00145-014-9180-2. S2CID 1450526.
^ abChor, Benny; Kushilevitz, Eyal; Goldreich, Oded; Sudan, Madhu (1 November 1998). "Private information retrieval" (PDF). Journal of the ACM. 45 (6): 965–981. CiteSeerX 10.1.1.51.3663. doi:10.1145/293347.293350. S2CID 544823.
^Kushilevitz, Eyal; Ostrovsky, Rafail (1997). "Replication is not needed: single database, computationally-private information retrieval". Proceedings of the 38th Annual Symposium on Foundations of Computer Science. Miami Beach, Florida, USA: IEEE Computer Society. pp. 364–373. CiteSeerX 10.1.1.56.2667. doi:10.1109/SFCS.1997.646125. ISBN 978-0-8186-8197-4. S2CID 11000506.
and 25 Related for: Private information retrieval information
derandomization, theory of fault tolerant computation, and privateinformationretrieval schemes. Locally decodable codes are especially useful for data...
representations of set data structures using bit vectors, in defining the privateinformationretrieval problem from communication complexity, and in descriptive complexity...
oblivious transfer is a strengthening of privateinformationretrieval, in which the database is not kept private. Claude Crépeau showed that Rabin's oblivious...
Geographic informationretrieval (GIR) or geographical informationretrieval systems are search tools for searching the Web, enterprise documents, and...
thermal insulation Privateinformationretrieval, a protocol for retrieving data without revealing what was retrieved Protein Information Resource, database...
the victim's data. Cryptovirology also encompasses the use of privateinformationretrieval (PIR) to allow cryptoviruses to search for and steal host data...
'information technology' was appropriate to describe the convergence of technologies with application in the vast field of data storage, retrieval, processing...
cryptography, including traitor tracing, randomness extractors, privateinformationretrieval, the security level and single-bit security of RSA encryption...
remote locations over the open Internet. To prevent disclosure of privateinformation or data sniffing, VPNs typically allow only authenticated remote...
Patent Application InformationRetrieval (PAIR) is an online service provided by the United States Patent and Trademark Office to allow users to see the...
from many users to anonymize what came from whom Privateinformationretrieval—get database information without server knowing which item was requested...
Information science is an academic field which is primarily concerned with analysis, collection, classification, manipulation, storage, retrieval, movement...
Rafail Ostrovsky, co-inventor of Oblivious RAM, of single-server PrivateInformationRetrieval, and proactive cryptosystems. Pascal Paillier, inventor of Paillier...
analytics, medical record retrieval, data aggregation, and risk adjustment coding. "CIOX Health: Private Company Information - Bloomberg". www.bloomberg...
informationretrieval, intelligence gathering, plagiarism detection, pattern recognition, anomaly detection and even art creation. Often information can...
well-established information science areas Knowledge organization Library studies Information architecture Information behavior Interactive informationretrieval Information...
tree analysis, Bayesian reasoning, product configuration, and privateinformationretrieval.[citation needed] Every arbitrary BDD (even if it is not reduced...
responses, CAs may be incentivised to deploy Let's Revoke. Privateinformationretrieval techniques can allay the privacy concern with pull-based checks...
storage and retrieval efficiency for specific kinds of datasets. Pick was originally implemented as the Generalized InformationRetrieval Language System...
Information management (IM) is the appropriate and optimized capture, storage, retrieval, and use of information. It may be personal information management...
of Health maintains the database as part of the Entrez system of informationretrieval. From 1971 to 1997, online access to the MEDLINE database had been...
distributed point function is known, then it is possible to perform privateinformationretrieval. As a simplified example of this, it is possible to test whether...