International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH

Authors:
Arthur Lazzaretti , Yale University
Charalampos Papamanthou , Yale University
Download:
DOI: 10.1007/978-3-031-38545-2_10 (login may be required)
Search ePrint
Search Google
Presentation: Slides
Conference: CRYPTO 2023
Abstract: In Private Information Retrieval (PIR), a client wishes to retrieve the value of an index $i$ from a public database of $N$ values without leaking any information about $i$. In their recent seminal work, Corrigan-Gibbs and Kogan (EUROCRYPT 2020) introduced the first two-server PIR protocol with sublinear amortized server time and sublinear $O(\sqrt{N} \log N)$ bandwidth. In a followup work, Shi et al. (CRYPTO 2021) reduced the bandwidth to polylogarithmic by proposing a construction based on privately puncturable pseudorandom functions, a primitive whose only construction known to date is based on heavy cryptographic primitives such as LWE. Partly because of this, their PIR protocol does not achieve concrete efficiency. In this paper we propose TreePIR, a two-server PIR protocol with sublinear amortized server time and polylogarithmic bandwidth whose security can be based on just the DDH assumption. TreePIR can be partitioned in two phases that are both sublinear: The first phase is remarkably simple and only requires pseudorandom generators. The second phase is a single-server PIR protocol on \emph{only} $\sqrt{N}$ indices, for which we can use the protocol by D\"ottling et al. (CRYPTO 2019) based on DDH, or, for practical purposes, the most concretely efficient single-server PIR protocol. Not only does TreePIR achieve better asymptotics than previous approaches while resting on weaker cryptographic assumptions, it also outperforms existing two-server PIR protocols in practice. The crux of our protocol is a new cryptographic primitive that we call weak privately puncturable pseudorandom functions, which we believe can have further applications.
BibTeX
@inproceedings{crypto-2023-33304,
  title={TreePIR: Sublinear-Time and Polylog-Bandwidth Private Information Retrieval from DDH},
  publisher={Springer-Verlag},
  doi={10.1007/978-3-031-38545-2_10},
  author={Arthur Lazzaretti and Charalampos Papamanthou},
  year=2023
}