TY - GEN
T1 - Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection
AU - Yakupoglu, Cavidan
AU - Rohloff, Kurt
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/8/23
Y1 - 2022/8/23
N2 - Private Information Retrieval (PIR) protocols enables fetching an arbitrary data from a server without revealing any information to the server about the data. In this paper, we construct three computational PIR (cPIR) protocols which we call P-cPIR and Recursive P-cPIR version I and II. We construct our cPIR protocols on a well known Fully Homomorphic Encryption scheme (FHE), BFVrns. For n = 220, 240, P-cPIR and Recursive P-cPIR version I provide at least ~214 × computational improvement over other prominent cPIR protocols. Recursive P-cPIR version II proposes the same query and half response cost as OnionPIR (lower communication cost in total) and less than other protocols such as SealPIR, SHECS-PIR, XPIR. It also proposes at least ~23 × less computational cost than other proposed protocols by stating the best performance in these protocols for both cases. We also provide a parameter selection method for the proposed cPIR protocols that takes the burden of parameter selection from the users and makes it more usable for real-life applications.
AB - Private Information Retrieval (PIR) protocols enables fetching an arbitrary data from a server without revealing any information to the server about the data. In this paper, we construct three computational PIR (cPIR) protocols which we call P-cPIR and Recursive P-cPIR version I and II. We construct our cPIR protocols on a well known Fully Homomorphic Encryption scheme (FHE), BFVrns. For n = 220, 240, P-cPIR and Recursive P-cPIR version I provide at least ~214 × computational improvement over other prominent cPIR protocols. Recursive P-cPIR version II proposes the same query and half response cost as OnionPIR (lower communication cost in total) and less than other protocols such as SealPIR, SHECS-PIR, XPIR. It also proposes at least ~23 × less computational cost than other proposed protocols by stating the best performance in these protocols for both cases. We also provide a parameter selection method for the proposed cPIR protocols that takes the burden of parameter selection from the users and makes it more usable for real-life applications.
KW - RLWE
KW - cPIR
KW - homomorphic encryption
KW - parameter selection
KW - private information retrieval
UR - http://www.scopus.com/inward/record.url?scp=85136964589&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85136964589&partnerID=8YFLogxK
U2 - 10.1145/3538969.3544417
DO - 10.1145/3538969.3544417
M3 - Conference contribution
AN - SCOPUS:85136964589
T3 - ACM International Conference Proceeding Series
BT - Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022
PB - Association for Computing Machinery
T2 - 17th International Conference on Availability, Reliability and Security, ARES 2022
Y2 - 23 August 2022 through 26 August 2022
ER -