Affiliation:
1. Indiana University
2. University of California , Berkeley
3. University of Calgary
Abstract
Abstract
We describe the design, analysis, implementation, and evaluation of Pirsona, a digital content delivery system that realizes collaborative-filtering recommendations atop private information retrieval (PIR). This combination of seemingly antithetical primitives makes possible—for the first time—the construction of practically efficient e-commerce and digital media delivery systems that can provide personalized content recommendations based on their users’ historical consumption patterns while simultaneously keeping said consumption patterns private. In designing Pirsona, we have opted for the most performant primitives available (at the expense of rather strong non-collusion assumptions); namely, we use the recent computationally 1-private PIR protocol of Hafiz and Henry (PETS 2019.4) together with a carefully optimized 4PC Boolean matrix factorization.
Reference42 articles.
1. [1] Esma Aïmeur, Gilles Brassard, José Manuel Fernandez, and Flavien Serge Mani Onana. Privacy-preserving demographic filtering. In Proceedings of ACM SAC 2006, pages 872–878, Dijon, France (April 2006).
2. [2] Esma Aïmeur, Gilles Brassard, José Manuel Fernandez, and Flavien Serge Mani Onana. Alambic: A privacy-preserving recommender system for electronic commerce. International Journal of Information Security (IJIS), 7(5):307–334, October 2008.
3. [3] Donald Beaver. Efficient multiparty protocols using circuit randomization. In Advances in Cryptology: Proceedings of CRYPTO 1991, volume 576 of LNCS, pages 420–432, Santa Barbara, CA, USA (August 1991).
4. [4] Amos Beimel, Yuval Ishai, and Tal Malkin. Reducing the servers’ computation in private information retrieval: PIR with preprocessing. Journal of Cryptology, 17(2):125–151, March 2004.
5. [5] Robert M. Bell, Yehuda Koren, and Chris Volinsky. The BellKor 2008 solution to the Netflix Prize. Available from: https://www.netflixprize.com/assets/ProgressPrize2008BellKor.pdf, 2008.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Grotto: Screaming fast (2+1)-PC or ℤ2n via (2,2)-DPFs;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
2. FastSecNet: An Efficient Cryptographic Framework for Private Neural Network Inference;IEEE Transactions on Information Forensics and Security;2023