VMkCwPIR: A Single-Round Scalable Multi-Keyword PIR Protocol Supporting Non-Primary Key Queries
Abstract
1. Introduction
How to realize multi-keyword private information retrieval (PIR) that enables the client to retrieve multiple matching records from a database without maintaining any prior metadata or auxiliary information locally.
1.1. Our Contributions
- Theoretical Novelty in Retrieval Functionality: We propose MkCwPIR, the first single-round multi-keyword PIR protocol. Distinct from existing schemes limited to single-identifier retrieval, our core theoretical contribution lies in a novel algebraic construction that leverages constant-weight codes. Crucially, we transform the challenge of conjunctive multi-keyword queries into a solvable framework based on Newton power sums and primitive root extraction. This mathematical approach enables complex logical filtering in a single interaction while strictly preserving keyword privacy against the server.
- Structural Optimization via Vectorized HE: To reduce the inherent computational overhead in multi-keyword matching, we design a specialized optimization strategy rather than a generic implementation tweak. By adapting BFV vectorized homomorphic encryption, we restructure the protocol’s workflow to parallelize the generation of the matching vector. This approach ensures high computational efficiency while minimizing communication overhead, effectively bridging the performance gap between complex multi-keyword queries and standard single-keyword retrievals.
- Simulation-Based Performance Benchmarking: We implemented both the baseline MkCwPIR and our optimized variant, VMkCwPIR, and conducted simulation experiments to measure the server-side computational costs at each step of the online phase. The results quantitatively demonstrate that the proposed vectorized workflow yields significant efficiency gains, validating the scalability of our algebraic construction for practical application scenarios.
- State-of-the-Art Comparative Analysis: We performed comparative evaluations between VMkCwPIR and the leading single-keyword scheme, CwPIR [22]. These experiments confirm that our protocol achieves comparable end-to-end latency to state-of-the-art single-keyword systems while supporting significantly richer query semantics.
1.2. Related Work
2. Preliminaries
2.1. Notations
2.2. Constant-Weight Code
2.3. Newton–Girard Identities
2.4. Fully Homomorphic Encryption (FHE)
- : Let . Sample , secret key , and error (where is a discrete Gaussian distribution over ). Output the public key and the private key .
- : Sample ; compute and output .
- : Compute ; output .
- : This operation inputs two ciphertexts and outputs the homomorphic addition results of the two ciphertexts, in which the ciphertexts in each corresponding slot are parallelized homomorphic addition.
- : This operation inputs a ciphertext and a plaintext , and outputs the ciphertext result after homomorphic multiplication of the two. The plaintext and ciphertext in the corresponding slot are calculated in parallel with homomorphic multiplication.
- : This operation inputs two ciphertexts and outputs the homomorphic multiplication results of the two ciphertexts, in which the ciphertexts in each corresponding slot are parallelized homomorphic multiplication.
- : This operation inputs a ciphertext and an integer constant , and outputs the ciphertext result that all slots are shifted to the left a times. If the ciphertext starts with the encryption of , it will eventually be the encryption of .
2.5. Threat Model
3. MkCwPIR Design
3.1. Design Intuition of PSD
3.2. Decomposition Method
3.3. MkCwPIR Protocol
3.3.1. MkCwPIR Setup Phase
| Algorithm 1 algorithm. |
|
3.3.2. MkCwPIR Query Phase
| Algorithm 2 algorithm. |
|
3.3.3. MkCwPIR Answer Phase
| Algorithm 3 algorithm. |
|
3.3.4. MkCwPIR Reconstruction Phase
| Algorithm 4 algorithm. |
|
4. Vectorized MkCwPIR
4.1. Communication and Computational Complexity of MkCwPIR
4.2. Packing Query Ciphertexts
| Algorithm 5 algorithm. |
|
| Algorithm 6 algorithm. |
|
4.3. Vectorization to Reduce Computation
| Algorithm 7 algorithm. |
|
| Algorithm 8 Algorithm. |
|
4.4. Vectorized Inner Product and Merging Response Ciphertext
| Algorithm 9 algorithm. |
|
| Algorithm 10 algorithm. |
|
4.5. Efficiency Analysis
4.6. Privacy and Correctness Analysis
4.7. Additional Optimization and Extensions
5. Implementation and Experiment
5.1. Implementation Environment
5.2. Experiment
6. Discussion
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Chor, B.; Kushilevitz, E.; Goldreich, O.; Sudan, M. Private information retrieval. J. ACM (JACM) 1998, 45, 965–981. [Google Scholar] [CrossRef]
- Beimel, A.; Stahl, Y. Robust information-theoretic private information retrieval. J. Cryptol. 2007, 20, 295–321. [Google Scholar] [CrossRef]
- Beimel, A.; Ishai, Y.; Kushilevitz, E.; Orlov, I. Share conversion and private information retrieval. In Proceedings of the 2012 IEEE 27th Conference on Computational Complexity, Porto, Portugal, 26–29 June 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 258–268. [Google Scholar]
- Dvir, Z.; Gopi, S. 2-server PIR with subpolynomial communication. J. ACM (JACM) 2016, 63, 1–15. [Google Scholar] [CrossRef]
- Kales, D.; Omolola, O.; Ramacher, S. Revisiting user privacy for certificate transparency. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden, 17–19 June 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 432–447. [Google Scholar]
- Mozaffari, H.; Houmansadr, A. Heterogeneous private information retrieval. In Network and Distributed Systems Security (NDSS) Symposium 2020; U.S. National Science Foundation: Alexandria, VA, USA, 2020. [Google Scholar]
- Eriguchi, R.; Kurosawa, K.; Nuida, K. Multi-Server PIR with Full Error Detection and Limited Error Correction. In Proceedings of the 3rd Conference on Information-Theoretic Cryptography, ITC 2022; Cambridge, MA, USA, 5–7 July 2022, pp. 1:1–1:20.
- Gong, T.; Henry, R.; Psomas, A.; Kate, A. More is merrier: Relax the non-collusion assumption in multi-server pir. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 4348–4366. [Google Scholar]
- Corrigan-Gibbs, H.; Henzinger, A.; Kogan, D. Single-server private information retrieval with sublinear amortized time. In Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2022; pp. 3–33. [Google Scholar]
- Zhou, M.; Lin, W.K.; Tselekounis, Y.; Shi, E. Optimal single-server private information retrieval. In Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2023; pp. 395–425. [Google Scholar]
- Menon, S.J.; Wu, D.J. YPIR: High-Throughput Single-Server PIR with Silent Preprocessing. In 33rd USENIX Security Symposium (USENIX Security 24); USENIX Association: Berkeley, CA, USA, 2024; pp. 5985–6002. [Google Scholar]
- Mughees, M.H.; Ren, L. Vectorized batch private information retrieval. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21–25 May 2023; IEEE: Piscataway, NJ, USA, 2023; pp. 437–452. [Google Scholar]
- Lazzaretti, A.; Papamanthou, C. TreePIR: Sublinear-time and polylog-bandwidth private information retrieval from DDH. In Annual International Cryptology Conference; Springer: Berlin/Heidelberg, Germany, 2023; pp. 284–314. [Google Scholar]
- Cao, Q.; Tran, H.Y.; Dau, S.H.; Yi, X.; Viterbo, E.; Feng, C.; Huang, Y.C.; Zhu, J.; Kruglik, S.; Kiah, H.M. Committed Private Information Retrieval. In ESORICS 2023: 28th European Symposium on Research in Computer Security; Springer: Cham, Switzerland, 2024; Lecture Notes in Computer Science; Volume 14344, pp. 393–413. [Google Scholar]
- Angel, S.; Chen, H.; Laine, K.; Setty, S. PIR with compressed queries and amortized query processing. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 20–24 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 962–979. [Google Scholar]
- Mughees, M.H.; Chen, H.; Ren, L. OnionPIR: Response efficient single-server PIR. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, 15–19 November 2021; pp. 2292–2306.
- Davidson, A.; Pestana, G.; Celi, S. Frodopir: Simple, scalable, single-server private information retrieval. Proc. Priv. Enhancing Technol. 2023, 2023, 365–383. [Google Scholar] [CrossRef]
- Henzinger, A.; Hong, M.M.; Corrigan-Gibbs, H.; Meiklejohn, S.; Vaikuntanathan, V. One server for the price of two: Simple and fast Single-Server private information retrieval. In 32nd USENIX Security Symposium (USENIX Security 23); USENIX Association: Berkeley, CA, USA, 2023; pp. 3889–3905. [Google Scholar]
- Zhou, M.; Park, A.; Zheng, W.; Shi, E. Piano: Extremely simple, single-server PIR with sublinear server computation. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 4296–4314. [Google Scholar]
- Liu, J.; Li, J.; Wu, D.; Ren, K. PIRANA: Faster multi-query PIR via constant-weight codes. In Proceedings of the 2024 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2024; IEEE: Piscataway, NJ, USA, 2024; pp. 4315–4330. [Google Scholar]
- Ali, A.; Lepoint, T.; Patel, S.; Raykova, M.; Schoppmann, P.; Seth, K.; Yeo, K. Communication–Computation trade-offs in PIR. In 30th USENIX Security Symposium (USENIX Security 21); USENIX Association: Berkeley, CA, USA, 2021; pp. 1811–1828. [Google Scholar]
- Mahdavi, R.A.; Kerschbaum, F. Constant-weight PIR: Single-round keyword PIR via constant-weight equality operators. In 31st USENIX Security Symposium (USENIX Security 22); USENIX Association: Berkeley, CA, USA, 2022; pp. 1723–1740. [Google Scholar]
- Celi, S.; Davidson, A. Call me by my name: Simple, practical private information retrieval for keyword queries. In 2024 on ACM SIGSAC Conference on Computer and Communications Security; Association for Computing Machinery: New York, NY, USA, 2024; pp. 4107–4121. [Google Scholar]
- Hao, M.; Liu, W.; Peng, L.; Zhang, C.; Wu, P.; Zhang, L.; Li, H.; Deng, R.H. Practical Keyword Private Information Retrieval from Key-to-Index Mappings. In 34th USENIX Security Symposium (USENIX Security 25); USENIX Association: Berkeley, CA, USA, 2025. [Google Scholar]
- Gentry, C. Fully homomorphic encryption using ideal lattices. In Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA, 31 May–2 June 2009; pp. 169–178. [Google Scholar]
- Van Dijk, M.; Gentry, C.; Halevi, S.; Vaikuntanathan, V. Fully homomorphic encryption over the integers. In Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2010; pp. 24–43. [Google Scholar]
- Gentry, C.; Halevi, S. Implementing gentry’s fully-homomorphic encryption scheme. In Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2011; pp. 129–148. [Google Scholar]
- Fan, J.; Vercauteren, F. Somewhat practical fully homomorphic encryption. Cryptol. ePrint Arch. 2012. [Google Scholar]
- Brakerski, Z.; Gentry, C.; Vaikuntanathan, V. (Leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory (TOCT) 2014, 6, 1–36. [Google Scholar] [CrossRef]
- Cheon, J.H.; Kim, A.; Kim, M.; Song, Y. Homomorphic encryption for arithmetic of approximate numbers. In International Conference on the Theory and Application of Cryptology and Information Security; Springer: Berlin/Heidelberg, Germany, 2017; pp. 409–437. [Google Scholar]
- Smart, N.P.; Vercauteren, F. Fully homomorphic SIMD operations. Des. Codes Cryptogr. 2014, 71, 57–81. [Google Scholar] [CrossRef]
- Castryck, W.; Iliashenko, I.; Vercauteren, F. Homomorphic SIMD Operations: Single Instruction Much More Data. In Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2018; pp. 338–359. [Google Scholar]
- Menon, S.J.; Wu, D.J. Spiral: Fast, high-rate single-server PIR via FHE composition. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 22–26 May 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 930–947. [Google Scholar]
- Microsoft. Microsoft SEAL: Release 4.1. 2024. Available online: https://github.com/microsoft/SEAL (accessed on 18 March 2026).



| Notation | Description |
|---|---|
| m | Number of client’s query keywords |
| n | Number of indices in the server database |
| t | Total number of distinct keywords in the database |
| The i-th power sum | |
| The client’s public and secret key pair | |
| D | The server-side database |
| The i-th index in database D | |
| The value associated with index | |
| The set of keywords corresponding to and | |
| The set of keywords queried by the client | |
| Statistical and computational security parameters | |
| The keyword domain defined by the server | |
| k | The maximum match count |
| Scheme | Communication | Rotation | |||
|---|---|---|---|---|---|
| MkCwPIR | – | ||||
| VMkCwPIR |
| Method | m | c | |||
|---|---|---|---|---|---|
| 512 | 1024 | 2048 | 4096 | ||
| MkCwPIR | 2 | 9.6 | 19.4 | 39.5 | 80.2 |
| VMkCwPIR | 10.3 | 20.8 | 41.3 | 83.2 | |
| MkCwPIR | 4 | 19.4 | 39.5 | 80.2 | 161.3 |
| VMkCwPIR | 10.3 | 20.8 | 41.3 | 83.2 | |
| MkCwPIR | 8 | 39.5 | 80.2 | 161.3 | 322.6 |
| VMkCwPIR | 10.3 | 20.8 | 41.3 | 163.2 | |
| Method | m | t | |||
|---|---|---|---|---|---|
| 512 | 1024 | 2048 | 4096 | ||
| MkCwPIR | 2 | 57.4 | 114.8 | 229.6 | 459.2 |
| VMkCwPIR | 28.7 | 57.4 | 114.8 | 229.6 | |
| MkCwPIR | 4 | 114.8 | 229.6 | 459.2 | 918.4 |
| VMkCwPIR | 28.7 | 57.4 | 114.8 | 229.6 | |
| MkCwPIR | 8 | 229.6 | 459.2 | 918.4 | 1836.8 |
| VMkCwPIR | 28.7 | 57.4 | 114.8 | 229.6 | |
| Method | m | n | |||
|---|---|---|---|---|---|
| 512 | 1024 | 2048 | 4096 | ||
| MkCwPIR | 2 | 29.7 | 59.5 | 120.8 | 242.6 |
| VMkCwPIR | 2.9 | 5.8 | 10.6 | 21.2 | |
| MkCwPIR | 4 | 89.6 | 179.0 | 362.9 | 728.3 |
| VMkCwPIR | 3.1 | 6.0 | 10.8 | 21.4 | |
| MkCwPIR | 8 | 208.9 | 417.5 | 846.6 | 1699.2 |
| VMkCwPIR | 3.5 | 6.4 | 11.2 | 21.8 | |
| Method | k | n | Resp. Num | |||
|---|---|---|---|---|---|---|
| 512 | 1024 | 2048 | 4096 | |||
| MkCwPIR | 1 | 3.2 | 6.4 | 12.8 | 25.6 | 1 |
| VMkCwPIR | 0.14 | 0.15 | 0.16 | 0.18 | 1 | |
| MkCwPIR | 4 | 12.8 | 25.6 | 51.2 | 102.4 | 4 |
| VMkCwPIR | 0.14 | 0.15 | 0.16 | 0.18 | 1 | |
| MkCwPIR | 16 | 51.2 | 102.4 | 204.8 | 409.6 | 16 |
| VMkCwPIR | 0.14 | 0.15 | 0.32 | 0.64 | 1 | |
| MkCwPIR | 64 | 204.8 | 409.6 | 819.2 | 1638.4 | 64 |
| VMkCwPIR | 0.32 | 0.64 | 1.2 | 2.5 | 1 | |
| Method | k | ||||
|---|---|---|---|---|---|
| 512 | 1024 | 2048 | 4096 | ||
| MKCWPIR | 1 | 99.9 | 200.1 | 402.7 | 807.6 |
| VMKCWPIR | 42.04 | 84.15 | 166.86 | 334.18 | |
| MKCWPIR | 4 | 236.6 | 473.7 | 953.5 | 1910.4 |
| VMKCWPIR | 42.24 | 84.35 | 167.06 | 334.38 | |
| MKCWPIR | 16 | 529.2 | 1059.3 | 2131.1 | 4268.2 |
| VMKCWPIR | 42.64 | 84.75 | 167.62 | 415.24 | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license.
Share and Cite
Lu, J.; Zhao, S.; Huang, Y.; Jia, Z.; Zhang, L.; Zhao, C. VMkCwPIR: A Single-Round Scalable Multi-Keyword PIR Protocol Supporting Non-Primary Key Queries. Information 2026, 17, 337. https://doi.org/10.3390/info17040337
Lu J, Zhao S, Huang Y, Jia Z, Zhang L, Zhao C. VMkCwPIR: A Single-Round Scalable Multi-Keyword PIR Protocol Supporting Non-Primary Key Queries. Information. 2026; 17(4):337. https://doi.org/10.3390/info17040337
Chicago/Turabian StyleLu, Junyu, Shengnan Zhao, Yuchen Huang, Zhongtian Jia, Lili Zhang, and Chuan Zhao. 2026. "VMkCwPIR: A Single-Round Scalable Multi-Keyword PIR Protocol Supporting Non-Primary Key Queries" Information 17, no. 4: 337. https://doi.org/10.3390/info17040337
APA StyleLu, J., Zhao, S., Huang, Y., Jia, Z., Zhang, L., & Zhao, C. (2026). VMkCwPIR: A Single-Round Scalable Multi-Keyword PIR Protocol Supporting Non-Primary Key Queries. Information, 17(4), 337. https://doi.org/10.3390/info17040337

