DPF-PIR: a scheme of feasible two-server keyword PIR with logarithmic communication
Chao LI , Zi-Yuan LIANG , Fan ZHANG , Jian LONG , Bing-Sheng ZHANG , Jian LIU
Front. Comput. Sci. ›› 2026, Vol. 20 ›› Issue (7) : 2007808
Private information retrieval (PIR) allows a client to privately request a block of data from a database such that no information about the queried block is revealed to the database owner. With the rapid rise of cloud computing, data is often shared across multiple servers, making multi-server PIR a promising privacy-enhancing technology. As the demand for faster keyword PIR protocols increases, current single-server PIR schemes suffer from significant computational and communication costs, while two-server PIR schemes demonstrate superior performance in this regard. In this paper, we address the problem of the keyword PIR against some adversary who can corrupt at most one party in our protocols in the semi-honest setting. A feasible two-server scheme DPF-PIR is presented, inspired by the original employment of the distributed point function. Without the need of downloading some “hint” about the database, DPF-PIR can achieve similar throughput results with the state-of-the-art single-server scheme, SimplePIR, and 25.5× faster than previous schemes. Meanwhile, the communication cost of DPF-PIR, which exhibits logarithmic complexity, is significantly lower compared to other schemes; for example, it is less than 2% of the communication cost of SimplePIR. We also present a variant of our scheme, PDPF-PIR, rendering the non-collusion assumption more acceptable in practice. Despite the decreased throughput due to heavier computational costs, PDPF-PIR is still at least 2× faster than previous single-server schemes.
private information retrieval / ditributed point function / secure multi-party computation
| [1] |
|
| [2] |
Mughees M H, Chen H, Ren L. OnionPIR: response efficient single-server PIR. In: Proceedings of 2021 ACM SIGSAC Conference on Computer and Communications Security. 2021, 2292−2306 |
| [3] |
|
| [4] |
|
| [5] |
|
| [6] |
|
| [7] |
|
| [8] |
|
| [9] |
Boyle E, Gilboa N, Ishai Y. Function secret sharing: improvements and extensions. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 1292−1303 |
| [10] |
|
| [11] |
|
| [12] |
|
| [13] |
Doerner J, Shelat A. Scaling ORAM for secure computation. In: Proceedings of 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017, 523−535 |
| [14] |
|
| [15] |
|
| [16] |
|
| [17] |
|
| [18] |
Kiayias A, Papadopoulos S, Triandopoulos N, Zacharias T. Delegatable pseudorandom functions and applications. In: Proceedings of 2013 ACM SIGSAC Conference on Computer & Communications Security. 2013, 669−684 |
| [19] |
|
| [20] |
|
| [21] |
|
| [22] |
Kolesnikov V, Kumaresan R, Rosulek M, Trieu N. Efficient batched oblivious PRF with applications to private set intersection. In: Proceedings of 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016, 818−829 |
| [23] |
|
| [24] |
|
| [25] |
|
| [26] |
|
| [27] |
Zhou J, Ross K A. Implementing database operations using SIMD instructions. In: Proceedings of 2002 ACM SIGMOD International Conference on Management of Data. 2002, 145−156 |
| [28] |
|
| [29] |
|
| [30] |
|
| [31] |
|
| [32] |
|
| [33] |
|
| [34] |
|
| [35] |
|
| [36] |
|
| [37] |
|
| [38] |
Goldberg I. Improving the robustness of private information retrieval. In: Proceedings of 2007 IEEE Symposium on Security and Privacy. 2007, 131−148 |
| [39] |
|
| [40] |
|
| [41] |
|
| [42] |
|
| [43] |
|
| [44] |
|
| [45] |
|
Higher Education Press
/
| 〈 |
|
〉 |