Paper 2022/1560
Verifiable Private Information Retrieval
Abstract
A computational PIR scheme allows a client to privately query a database hosted on a single server without downloading the entire database.
We introduce the notion of verifiable PIR (vPIR) where the server can convince the client that the database satisfies certain properties without additional rounds and while keeping the communication sub-linear. For example, the server can prove that the number of rows in the database that satisfy a predicate
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Published by the IACR in TCC 2022
- Contact author(s)
-
shanygabizon @ gmail com
yael @ microsoft com
omerpa @ tauex tau ac il - History
- 2022-11-10: approved
- 2022-11-09: received
- See all versions
- Short URL
- https://ia.cr/2022/1560
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2022/1560, author = {Shany Ben-David and Yael Tauman Kalai and Omer Paneth}, title = {Verifiable Private Information Retrieval}, howpublished = {Cryptology {ePrint} Archive, Paper 2022/1560}, year = {2022}, url = {https://eprint.iacr.org/2022/1560} }