Private Information Retrieval by Keywords

Benny Chor, Niv Gilboa, Moni Naor

Research output: Contribution to journalArticle


Private information retrieval (PIR) schemes enable a user to access one or more servers that hold copies of a database and privately retrieve parts of the n bits of data stored in the database. This means that the queries give each individual database no partial information (in the information theoretic or computational sense) on the identity of the item retrieved by the user. All known PIR schemes assume that the user knows the physical address of the sought item. This is usually not the case when accessing a public database that is not managed by the user. Such databases are typically presented with keywords, which are then internally translated (at the database end) to physical addresses, using an appropriate search structure (for example, a hash table or a binary tree). In this note we describe a simple, modular way to privately access data by keywords. It combines any conventional search structure with any underlying PIR scheme (including single server schemes). The transformation requires no modification in the way that the search structure is maintained. Therefore the same database will support both private and regular (non private) searches
Original languageEnglish GB
JournalIACR Cryptology ePrint Archive
StatePublished - 1998


Dive into the research topics of 'Private Information Retrieval by Keywords'. Together they form a unique fingerprint.

Cite this