Cryptology ePrint Archive: Report 2021/1157

Private Nearest Neighbor Search with Sublinear Communication and Malicious Security

Sacha Servan-Schreiber and Simon Langowski and Srinivas Devadas

Abstract: Nearest neighbor search is a fundamental building-block for a wide range of applications. A privacy-preserving protocol for nearest neighbor search involves a set of clients who send queries to a remote database. Each client retrieves the nearest neighbor(s) to its query in the database without revealing any information about the query. To ensure database privacy, clients must learn as little as possible beyond the query answer, even if behaving maliciously by deviating from protocol. Existing protocols for private nearest neighbor search require heavy cryptographic tools, resulting in high computational and bandwidth overheads.

In this paper, we present the first lightweight protocol for private nearest neighbor search. Our protocol is instantiated using two non-colluding servers, each holding a replica of the database. Our design supports an arbitrary number of clients simultaneously querying the database through the two servers. Each query consists of a single round of communication between the client and the two servers. No communication is required between the servers to answer queries.

If at least one of the servers is non-colluding, we ensure that (1) no information is revealed on the client’s query, (2) the total communication between the client and the servers is sublinear in the database size, and (3) each query answer only leaks a small and bounded amount of information about the database to the client, even if the client is malicious.

We implement our protocol and report its performance on real-world data. Our construction requires between 10 and 20 seconds of query latency over large databases of 10M feature vectors. Client overhead remained under 10 ms of processing time per query and less than 10 MB of communication, depending on parameters.

Category / Keywords: applications / privacy-preserving,similarity,nearest, neighbor, search,locality-sensitive,hashing,lsh,lightweight,recommendation

Original Publication (with minor differences): IEEE Security and Privacy 2022 (to appear)

Date: received 10 Sep 2021, last revised 17 Dec 2021

Contact author: 3s at mit edu, slangows at mit edu, devadas at mit edu

Available format(s): PDF | BibTeX Citation

Version: 20211217:135438 (All versions of this report)

Short URL: ia.cr/2021/1157


[ Cryptology ePrint archive ]