An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin.

Slides:



Advertisements
Similar presentations
Estimating Distinct Elements, Optimally
Advertisements

Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
Numerical Linear Algebra in the Streaming Model Ken Clarkson - IBM David Woodruff - IBM.
Truthful Mechanisms for Combinatorial Auctions with Subadditive Bidders Speaker: Shahar Dobzinski Based on joint works with Noam Nisan & Michael Schapira.
Sublinear Algorithms … Lecture 23: April 20.
Boolean Circuits of Depth-Three and Arithmetic Circuits with General Gates Oded Goldreich Weizmann Institute of Science Based on Joint work with Avi Wigderson.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
The Communication Complexity of Approximate Set Packing and Covering
Applied Informatics Štefan BEREŽNÝ
Oblivious Branching Program Evaluation
Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.
Cook’s Theorem The Foundation of NP-Completeness.
Information and Coding Theory
Locally Decodable Codes
Noga Alon Institute for Advanced Study and Tel Aviv University
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Introduction to Computability Theory
Sarah Spence Adams Assoc. Professor of Mathematics and Electrical & Computer Engineering COMBINATORIAL DESIGNS AND RELATED DISCRETE AND ALGEBRAIC STRUCTURES.
Private Information Retrieval Benny Chor, Oded Goldreich, Eyal Kushilevitz and Madhu Sudan Journal of ACM Vol.45 No Reporter : Chen, Chun-Hua Date.
Combinatorial Designs and related Discrete Combinatorial Structures Discrete Mathematics Olin College Sarah Spence Adams Fall 2007.
Sarah Spence Adams Professor of Mathematics and Electrical & Computer Engineering COMBINATORIAL DESIGNS AND RELATED DISCRETE AND ALGEBRAIC STRUCTURES.
SARAH SPENCE ADAMS ASSOC. PROFESSOR OF MATHEMATICS AND ELECTRICAL & COMPUTER ENGINEERING Combinatorial Designs and Related Discrete Combinatorial Structures.
Jacobi’s work on normal forms of differential systems François Ollivier LIX UMR CNRS-Ecole polytechnique 7161 AMS special session on Differential Algebra,
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
Private Information Retrieval. What is Private Information retrieval (PIR) ? Reduction from Private Information Retrieval (PIR) to Smooth Codes Constructions.
Combinatorial Designs and Related Discrete Combinatorial Structures Sarah Spence Adams Fall 2008.
Computing Sketches of Matrices Efficiently & (Privacy Preserving) Data Mining Petros Drineas Rensselaer Polytechnic Institute (joint.
Private Information Retrieval Amos Beimel – Ben-Gurion University Tel-Hai, June 4, 2003 This talk is based on talks by:
Codes with local decoding procedures Sergey Yekhanin Microsoft Research.
1 Relational Algebra and Calculus Yanlei Diao UMass Amherst Feb 1, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke.
Ger man Aerospace Center Gothenburg, April, 2007 Coding Schemes for Crisscross Error Patterns Simon Plass, Gerd Richter, and A.J. Han Vinck.
Tractable Symmetry Breaking Using Restricted Search Trees Colva M. Roney-Dougal, Ian P. Gent, Tom Kelsey, Steve Linton Presented by: Shant Karakashian.
1 Fingerprinting techniques. 2 Is X equal to Y? = ? = ?
A Linear Lower Bound on the Communication Complexity of Single-Server PIR Weizmann Institute of Science Israel Iftach HaitnerJonathan HochGil Segev.
DISCRETE COMPUTATIONAL STRUCTURES CS Fall 2005.
Three different ways There are three different ways to show that ρ(A) is a simple eigenvalue of an irreducible nonnegative matrix A:
1 Closures of Relations: Transitive Closure and Partitions Sections 8.4 and 8.5.
4.4 Identify and Inverse Matrices Algebra 2. Learning Target I can find and use inverse matrix.
Modern information retreival Chapter. 02: Modeling (Latent Semantic Indexing)
DISCRETE COMPUTATIONAL STRUCTURES CSE 2353 Fall 2010 Most slides modified from Discrete Mathematical Structures: Theory and Applications by D.S. Malik.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
DISCRETE COMPUTATIONAL STRUCTURES
On Locally Decodable Codes Self Correctable Codes t-private PIR and Omer Barkol, Yuval Ishai and Enav Weinreb Technion, Israel.
Some Computation Problems in Coding Theory
Algebraic Lower Bounds for Computing on Encrypted Data Rafail Ostrovsky William E. Skeith III.
DISCRETE COMPUTATIONAL STRUCTURES CSE 2353 Material for Second Test Spring 2006.
Lower bounds on data stream computations Seminar in Communication Complexity By Michael Umansky Instructor: Ronitt Rubinfeld.
Private Information Retrieval Based on the talk by Yuval Ishai, Eyal Kushilevitz, Tal Malkin.
The Message Passing Communication Model David Woodruff IBM Almaden.
The geometric GMST problem with grid clustering Presented by 楊劭文, 游岳齊, 吳郁君, 林信仲, 萬高維 Department of Computer Science and Information Engineering, National.
拉丁方陣 交大應數系 蔡奕正. Definition A Latin square of order n with entries from an n-set X is an n * n array L in which every cell contains an element of X such.
Sergey Yekhanin Institute for Advanced Study Lower Bounds on Noise.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
SSE-2 Step1: keygen(1 k ):s {0,1} k,output K=s Step2:Buildindex(K,D): 建立 table T, p=word bit+max bit R 假設 w 1 出現在 D 1,D 3 T[π s (w 1 ||1)]=D 1 T[π s (w.
Secret Sharing Schemes: A Short Survey Secret Sharing 2.
Linear, Nonlinear, and Weakly-Private Secret Sharing Schemes
Chapter 3 The Fundamentals: Algorithms, the integers, and matrices Section 3.4: The integers and division Number theory: the part of mathematics involving.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
New Locally Decodable Codes and Private Information Retrieval Schemes
Unit-III Algebraic Structures
Learn about relations and their basic properties
Other confidence intervals
On the Size of Pairing-based Non-interactive Arguments
Sublinear-Time Error-Correction and Error-Detection
Sublinear-Time Error-Correction and Error-Detection
Algorithms and networks
Computational Molecular Biology
Branching Programs Part 3
Switching Lemmas and Proof Complexity
Presentation transcript:

An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin

Private Information Retrieval [CGKS] 1 ≤ i ≤ n D is a binary string of length n. k non-communicating servers hold the same database D. User holds index i and wants to retrieve D i. Each individual server should get no information about i. Goal: Minimize communication complexity! D D : :

PIR: progress k Lower bound Upper bound 1 Θ(n) [CGKS] 2 5 log n [WdW] O(n 1/3 ) [CGKS,BI+IK,WY] O(n 1/3 ) [CGKS,BI+IK,WY] 3 O(n 1/3 ) [CGKS] O(n 1/3 ) [CGKS] O(n 1/5 ) [A] O(n 1/5 ) [A] O(n 1/5.25 ) [BIKR] O(n 1/5.25 ) [BIKR] O(n 1/32,582,658 ) [Y] O(n 1/32,582,658 ) [Y] n O(1/log log n) [Y] n O(1/log log n) [Y]

2 server case: restricted lower bounds [Itoh] Ω(n 1/4 ) Servers return affine functions of the queries [GKST] [WdW] Ω ( n 1/(s+1) ) User reads at most s bits from servers’ responses This work Ω(n 1/3 ) Bilinear group based PIR schemes Models are incomparable Each model captures all known PIR schemes

Plan of the talk An example PIR scheme [WY] An example PIR scheme [WY] Statement of our lower bound Statement of our lower bound Our technique Our technique

Example PIR: algebraization 101…011 1 ≤ i ≤ n, wants D i. D = Database D[n] is represented by a cubic multivariate polynomial F(x 1,…, x m ) over a finite field F q Polynomial is in m=n 1/3 variables For every i there is a point P i such that D i =F(P i )

Example PIR Privacy, O(n 1/3 ) communication, correctness The scheme requires at least 4 servers Note: the communication is unbalanced

Example PIR Privacy, O(n 1/3 ) communication, correctness …

Example PIR Correctness: User reconstructs values of derivatives of from the values of partial derivatives of User learns: Reconstructs:

Key properties of example PIR Servers represent database D by a function on a group, and user can retrieve the function value at any group element (including elements that do not correspond to database bits). User computes the dot product of servers’ responses to obtain D i. These properties are common to all known PIR schemes.

Our result Theorem: Every bilinear group based PIR protocol requires Ω(n 1/3 ) communication Theorem: Every bilinear group based PIR protocol requires Ω(n 1/3 ) communication – Bilinear: user outputs dot product of servers’ responses – Servers represent database by a function on a finite group G and user can retrieve function values at arbitrary group elements using the natural secret sharing based on G.

Our technique Combinatorial view of PIR Combinatorial view of PIR Specialization to bilinear PIR Specialization to bilinear PIR Specialization to bilinear group based PIR Specialization to bilinear group based PIR Algebraic problem Algebraic problem

Combinatorial view of PIR Notion – Generalized Latin Square S[n, T]: x1x1x1x1 x2x2x2x2 x3x3x3x3 x1x1x1x1 x2x2x2x2 x3x3x3x3 x2x2x2x2 x3x3x3x3 x1x1x1x1 x3x3x3x3 x1x1x1x1 x2x2x2x2 x3x3x3x3 x1x1x1x1 x2x2x2x2 Square of size T by T Square of size T by T n variables n variables Every variable appears once in every row/column Every variable appears once in every row/column

Combinatorial view of PIR Notion – Embedding of matrices: Let S ∈ {0,1} T ╳ T A ∈ {0,1} L ╳ L. S embeds into A if there exist two embedding maps r,c :[T]→[L] such that for all j,k ∈ [T]: S jk =A r(j)c(k)

Combinatorial view of PIR Theorem: PIR schemes with t long queries and r long answers are equivalent * to pairs of matrices S  A such that: – S is Generalized Latin Square [n, 2 t ] – A is a binary square matrix of size 2 r – For every {0,1} assignment to variables x i S can be completed to a {0,1} matrix that embeds into A. x1x1x1x1 x2x2x2x2 x3x3x3x3 x1x1x1x1 x2x2x2x2 x3x3x3x3 x2x2x2x2 x3x3x3x3 x1x1x1x1 x3x3x3x3 x1x1x1x1 x2x2x2x2 x3x3x3x3 x1x1x1x1 x2x2x2x

Combinatorial view of PIR: Proof Given S  A we construct a PIR protocol: Servers obtain the embedding maps r,c:[T]→[L] U : Randomly picks j,k ∈ [T] such that S jk =i U : Randomly picks j,k ∈ [T] such that S jk =i U→S 1 : j U→S 1 : j U→S 2 : k U→S 2 : k S 1 →U : r(j) S 1 →U : r(j) S 1 →U : c(k) S 1 →U : c(k) U: Outputs A r(j)c(k) U: Outputs A r(j)c(k) Communication complexity, correctness, privacy

Combinatorial view of bilinear PIR Theorem: Bilinear PIR schemes with t long queries and r long answers are equivalent * to 2 t by 2 t matrices S that are: – Generalized Latin Squares [n, 2 t ] – For every {0,1} assignment to variables x i can be completed to F 2 rank ≤ r. x1x1x1x1 x2x2x2x2 x3x3x3x3 x1x1x1x1 x2x2x2x2 x3x3x3x3 x2x2x2x2 x3x3x3x3 x1x1x1x1 x3x3x3x3 x1x1x1x1 x2x2x2x2 x3x3x3x3 x1x1x1x1 x2x2x2x2 S  A Bilinear PIR schemes S  A have A=H r

Specialization to group based PIR Notion - Matrix S respects the structure of a finite group G Example: G=Z 5 (circulant matrices)

Specialization to group based PIR 2 n different databases yield 2 n different low rank completions of a GLS S[n, 2 t ]. In group based PIR over a group G schemes all such completions respect the structure of G We use representation theory to count the total number A(G,r) of rank ≤ r matrices respecting the group structure 0 x1x1x1x1 x2x2x2x21 x3x3x3x3 x1x1x1x1 x2x2x2x21 x3x3x3x30 x2x2x2x21 x3x3x3x30 x1x1x1x1 1 x3x3x3x30 x1x1x1x1 x2x2x2x2 x3x3x3x30 x1x1x1x1 x2x2x2x21

Algebraic problem A(G,r) can be defined in algebraic terms: The upper bound proof requires modular (i.e. non- semisimlpe) representation theory and yields: A(G,r) ≤ 2 (log G)*r 2 n ≤ (log G) * r 2

Open problems Can our technique be extended to a lower bound for bilinear PIR? Can our technique be extended to a lower bound for bilinear PIR? Can our technique be used to establish a connection to matrix rigidity? Can our technique be used to establish a connection to matrix rigidity?