Private Information
Retrieval
Every time you search a library catalog, the server learns what you looked for. Your reading interests — medical diagnoses, political views, personal struggles — are logged and potentially exposed.
Private Information Retrieval solves this. You retrieve exactly what you want from a database — and the server learns nothing about which item you chose.
This demo implements the 1995 Chor et al. two-server IT-PIR protocol. The privacy guarantee is information-theoretic — not computational. No assumptions about server computing power are required. It is provably private.
Library Catalog
Select a book to query privately.
Protocol Visualizer
Select a book above and click Query Privately to watch the IT-PIR protocol execute step by step.
Client generates query pair
These look like random noise to each server. Neither server can determine which bit differs — or which book you want.
Server 1 XOR computation
Server 2 XOR computation
Client reconstructs the book
What each server knew
Neither server saw your query. Both received cryptographically random-looking masks. The book you retrieved — — remains private.
Naive vs. Private Query
GET /catalog/search?q=[select a book above]
The server receives your exact search term and logs it. Your reading interests are permanently recorded.