A tight lower bound for restricted pir protocols

We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are one bit long must ask questions that are at least n−2 bits long, which is nearly equal to the known n−1 upper bound. This improves upon the approximately 0.25n lower bound of Kerenidis and deWolf while avo...

Full description

Saved in:
Bibliographic Details
Published inComputational complexity Vol. 15; no. 1; pp. 82 - 91
Main Authors Beigel, Richard, Fortnow, Lance, Gasarch, William
Format Journal Article
LanguageEnglish
Published Heidelberg Springer Nature B.V 01.05.2006
Subjects
Online AccessGet full text
ISSN1016-3328
1420-8954
DOI10.1007/s00037-006-0208-3

Cover

Abstract We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are one bit long must ask questions that are at least n−2 bits long, which is nearly equal to the known n−1 upper bound. This improves upon the approximately 0.25n lower bound of Kerenidis and deWolf while avoiding their use of quantum techniques.
AbstractList We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are one bit long must ask questions that are at least n−2 bits long, which is nearly equal to the known n−1 upper bound. This improves upon the approximately 0.25n lower bound of Kerenidis and deWolf while avoiding their use of quantum techniques.
Author Beigel, Richard
Gasarch, William
Fortnow, Lance
Author_xml – sequence: 1
  givenname: Richard
  surname: Beigel
  fullname: Beigel, Richard
– sequence: 2
  givenname: Lance
  surname: Fortnow
  fullname: Fortnow, Lance
– sequence: 3
  givenname: William
  surname: Gasarch
  fullname: Gasarch, William
BookMark eNp9kD1PwzAQhi1UJNrCD2CLxGw45xx_jFUFFKkSC8yW49iQKsTFdoX496QqEwPT3fA-956eBZmNcfSEXDO4ZQDyLgMASgogKNSgKJ6ROeM1UKUbPpt2YIIi1uqCLHLeAbBGIZ8TWFWlf3sv1RC_fKraeBi7KsRUJZ9L6l3xXbXvU7VPsUQXh3xJzoMdsr_6nUvy-nD_st7Q7fPj03q1pQ5RF9qCakAyjo0PApXTUlkMXVBct85ray2zXKBsuYRGa4ZSdSqAE52X6HWDS3Jzujs1fx6mZ8wuHtI4VZpaCM6F4kxNKXlKuRRzTj4Y1xdb-jiWZPvBMDBHPeakx0x6zFGPwYlkf8h96j9s-v6H-QFFqWfO
CitedBy_id crossref_primary_10_1007_s10462_010_9161_2
crossref_primary_10_1145_1326554_1326555
crossref_primary_10_1137_06065773X
crossref_primary_10_1145_3688824
crossref_primary_10_1587_transinf_E93_D_263
ContentType Journal Article
Copyright Birkhäuser Verlag, Basel 2006.
Copyright_xml – notice: Birkhäuser Verlag, Basel 2006.
DBID AAYXX
CITATION
DOI 10.1007/s00037-006-0208-3
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISSN 1420-8954
EndPage 91
ExternalDocumentID 10_1007_s00037_006_0208_3
GroupedDBID -Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
199
1N0
1SB
2.D
203
28-
29F
2J2
2JN
2JY
2KG
2KM
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5QI
5VS
67Z
6NX
78A
8TC
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AAOBN
AAPKM
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYXX
AAYZH
ABAKF
ABBBX
ABBRH
ABBXA
ABDBE
ABDZT
ABECU
ABFSG
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABLJU
ABMNI
ABMQK
ABNWP
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACIWK
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSTC
ACZOJ
ADHHG
ADHIR
ADHKG
ADIMF
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFIE
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AEZWR
AFBBN
AFDZB
AFEXP
AFGCZ
AFHIU
AFLOW
AFOHR
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGQPQ
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHPBZ
AHSBF
AHWEU
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AIXLP
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARMRJ
ASPBG
ATHPR
AVWKF
AXYYD
AYFIA
AYJHY
AZFZN
B-.
BA0
BBWZM
BDATZ
BGNMA
BSONS
CAG
CITATION
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ7
GQ8
GXS
H13
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
KDC
KOV
KOW
LAS
LLZTM
M4Y
MA-
MBV
N2Q
N9A
NDZJH
NPVJJ
NQJWS
NU0
O9-
O93
O9G
O9I
O9J
OAM
P19
P2P
P9O
PF0
PT4
PT5
QOK
QOS
R4E
R89
R9I
RHV
RNI
RNS
ROL
RPX
RSV
RZK
S16
S1Z
S26
S27
S28
S3B
SAP
SCJ
SCLPG
SCO
SDH
SDM
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
T13
T16
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
ZMTXR
~EX
ABRTQ
ID FETCH-LOGICAL-c339t-b085071435ef638c978a3fdf849bce9aaa1a4637b4705991378d8f0c6de73e953
ISSN 1016-3328
IngestDate Tue Sep 09 14:50:36 EDT 2025
Tue Jul 01 01:36:14 EDT 2025
Thu Apr 24 22:57:26 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://www.springer.com/tdm
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c339t-b085071435ef638c978a3fdf849bce9aaa1a4637b4705991378d8f0c6de73e953
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2664468418
PQPubID 2044003
PageCount 10
ParticipantIDs proquest_journals_2664468418
crossref_citationtrail_10_1007_s00037_006_0208_3
crossref_primary_10_1007_s00037_006_0208_3
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2006-05-01
PublicationDateYYYYMMDD 2006-05-01
PublicationDate_xml – month: 05
  year: 2006
  text: 2006-05-01
  day: 01
PublicationDecade 2000
PublicationPlace Heidelberg
PublicationPlace_xml – name: Heidelberg
PublicationTitle Computational complexity
PublicationYear 2006
Publisher Springer Nature B.V
Publisher_xml – name: Springer Nature B.V
SSID ssj0015834
Score 1.7754304
Snippet We show that any 1-round 2-server Private Information Retrieval Protocol where the answers are one bit long must ask questions that are at least n−2 bits long,...
SourceID proquest
crossref
SourceType Aggregation Database
Enrichment Source
Index Database
StartPage 82
SubjectTerms Computer science
Information retrieval
Lower bounds
Upper bounds
Title A tight lower bound for restricted pir protocols
URI https://www.proquest.com/docview/2664468418
Volume 15
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1JS8QwFA6jXvQgrriMkoMnh0o7SdvkOIoLop4UvJVslQEZxVYQf70vSzuLC-qllNCGpO_ry0ve8iF0UArODWdlZLTKIpooFUn7PwI-Eh1LpYm22cjXN9nFHb28T-87nauJqKXXWh6p9y_zSv4jVWgDudos2T9Itu0UGuAe5AtXkDBcfyXjQa-2e-veo6U660nLkOTCBi3fBug3a0w-D19sDFb9BAKvJi1RT-fQHAW6yHLzNqzH-Q1m-OA9-BO594HPox55j9DVJGTORSUCsVQ4xJk9UWji94ISBDMwIiQkbRvfRmGbybgv-NxqzvQTQrwa9HxCYUH1bFyfVLWPzqhcBZzIjaJvj2rH61Lji59ZrtogwrbgsuuicAF60EVB5tBCP8-t035hcHZ8fNN6lVLmowya-TVe7tgVlZ0ex7SdMr1MO9vjdgUth00DHngErKKOGa2hpeu24m61juIBdljADgvYYQEDFvAYCxiwgFssbKC7s9Pbk4sosGFEihBeR9IWF7Rs9akpQWkq2P4LUuqSUS6V4UKIRNCM5JLmtuZOQnKmWRmrTJucGJ6STTQ_ehqZLYQlZTGP85LSjFOjOeurVPa1ESzNZUbLbRQ3cy9UKBVvGUsei2-_-TY6bF959nVSfnq423zQIvxOVQGWIoyH0YTt_KWvXbQ4xnAXzdcvr2YP7MRa7gfxfwCdwWKg
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A+tight+lower+bound+for+restricted+pir+protocols&rft.jtitle=Computational+complexity&rft.au=Beigel%2C+Richard&rft.au=Fortnow%2C+Lance&rft.au=Gasarch%2C+William&rft.date=2006-05-01&rft.issn=1016-3328&rft.eissn=1420-8954&rft.volume=15&rft.issue=1&rft.spage=82&rft.epage=91&rft_id=info:doi/10.1007%2Fs00037-006-0208-3&rft.externalDBID=n%2Fa&rft.externalDocID=10_1007_s00037_006_0208_3
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1016-3328&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1016-3328&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1016-3328&client=summon