You are looking at a specific version 20211217:135438 of this paper. See the latest version.

Paper 2021/1157

Private Nearest Neighbor Search with Sublinear Communication and Malicious Security

Sacha Servan-Schreiber and Simon Langowski and Srinivas Devadas

Abstract

Nearest neighbor search is a fundamental building-block for a wide range of applications. A privacy-preserving protocol for nearest neighbor search involves a set of clients who send queries to a remote database. Each client retrieves the nearest neighbor(s) to its query in the database without revealing any information about the query. To ensure database privacy, clients must learn as little as possible beyond the query answer, even if behaving maliciously by deviating from protocol. Existing protocols for private nearest neighbor search require heavy cryptographic tools, resulting in high computational and bandwidth overheads. In this paper, we present the first lightweight protocol for private nearest neighbor search. Our protocol is instantiated using two non-colluding servers, each holding a replica of the database. Our design supports an arbitrary number of clients simultaneously querying the database through the two servers. Each query consists of a single round of communication between the client and the two servers. No communication is required between the servers to answer queries. If at least one of the servers is non-colluding, we ensure that (1) no information is revealed on the client’s query, (2) the total communication between the client and the servers is sublinear in the database size, and (3) each query answer only leaks a small and bounded amount of information about the database to the client, even if the client is malicious. We implement our protocol and report its performance on real-world data. Our construction requires between 10 and 20 seconds of query latency over large databases of 10M feature vectors. Client overhead remained under 10 ms of processing time per query and less than 10 MB of communication, depending on parameters.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Published elsewhere. Minor revision. IEEE Security and Privacy 2022 (to appear)
Keywords
privacy-preservingsimilaritynearestneighborsearchlocality-sensitivehashinglshlightweightrecommendation
Contact author(s)
3s @ mit edu,slangows @ mit edu,devadas @ mit edu
History
2023-05-24: last of 6 revisions
2021-09-14: received
See all versions
Short URL
https://ia.cr/2021/1157
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.