AIセキュリティポータル K Program
PRAG End-to-End Privacy-Preserving Retrieval-Augmented Generation
Share
Abstract
Retrieval-Augmented Generation (RAG) is essential for enhancing Large Language Models (LLMs) with external knowledge, but its reliance on cloud environments exposes sensitive data to privacy risks. Existing privacy-preserving solutions often sacrifice retrieval quality due to noise injection or only provide partial encryption. We propose PRAG, an end-to-end privacy-preserving RAG system that achieves end-to-end confidentiality for both documents and queries without sacrificing the scalability of cloud-hosted RAG. PRAG features a dual-mode architecture: a non-interactive PRAG-I utilizes homomorphic-friendly approximations for low-latency retrieval, while an interactive PRAG-II leverages client assistance to match the accuracy of non-private RAG. To ensure robust semantic ordering, we introduce Operation-Error Estimation (OEE), a mechanism that stabilizes ranking against homomorphic noise. Experiments on large-scale datasets demonstrate that PRAG achieves competitive recall (72.45%-74.45%), practical retrieval latency, and strong resilience against graph reconstruction attacks while maintaining end-to-end confidentiality. This work confirms the feasibility of secure, high-performance RAG at scale.
Evidencebot: A privacy-preserving, customizable rag-based tool for enhancing large language model interactions
N. I. Khan, V. Filkov
Published: 2025
Privacy-preserving llm-based rag with split inference and masked privacy recovery
Y. Wei, P. Xia, Y. Ni, J. Li
Published: 2025
Rag-based ai agents for enterprise software development: Implementation patterns and production deployment
X. Zhao, T. Sun, S. Ren, J. Yang, Y. Liu
Published: 2025
Ekrag: Benchmark rag for enterprise knowledge question answering
T. Yu, W. Zhou, L. Leiyang, A. Shukla, M. Mmadugula, P. Gundecha, N. Burnett, A. Xu, V. Viseth, T. Tbar
Published: 2025
Privacy-preserving medical advising system on mobile devices: On-device phi anonymization, medical report retrieval, and cloud-based rag
T. B. Weerasekara, C. Chandeepa, O. S. Amarasuriya, C. Hettiarachchi
Published: 2025
Remoterag: A privacy-preserving llm cloud rag service
Y. Cheng, L. Zhang, J. Wang, M. Yuan, Y. Yao
Published: 2025
Rag with differential privacy
N. Grislain
Published: 2025
Textual differential privacy for context-aware reasoning with large language model
J. Yu, J. Zhou, Y. Ding, L. Zhang, Y. Guo, H. Sato
Published: 2024
SANNS: Scaling up secure approximate k-Nearest neighbors search
H. Chen, I. Chillotti, Y. Dong, O. Poburinnaya, I. Razenshteyn, M. S. Riazi
Published: 2020
Toward efficient encrypted image retrieval in cloud environment
Z. Huang, M. Zhang, Y. Zhang
Published: 2019
Achieving efficient and privacy-preserving exact set similarity search over encrypted data
Y. Zheng, R. Lu, Y. Guan, J. Shao, H. Zhu
Published: 2020
Secure and efficient similarity retrieval in cloud computing based on homomorphic encryption
N. Wang, W. Zhou, J. Wang, Y. Guo, J. Fu, J. Liu
Published: 2024
Efficient private comparison queries over encrypted databases using fully homomorphic encryption with finite fields
B. H. M. Tan, H. T. Lee, H. Wang, S. Ren, K. M. M. Aung
Published: 2021
Insecurity and hardness of nearest neighbor queries over encrypted data
R. Li, A. X. Liu, Y. Liu, H. Xu, H. Yuan
Published: 2019
High-precision bootstrapping of rns-ckks homomorphic encryption using optimal minimax polynomial approximation and inverse sine function
J.-W. Lee, E. Lee, Y. Lee, Y.-S. Kim, J.-S. No
Published: 2021
Bootstrapping bits with ´ ckks
S. Bae, J. H. Cheon, A. Kim, D. Stehle
Published: 2024
Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks
Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim Rocktäschel, Sebastian Riedel, Douwe Kiela
Published: 2020.5.23
Active retrieval augmented generation
Zhengbao Jiang, Frank F Xu, Luyu Gao, Zhiqing Sun, Qian Liu, Jane Dwivedi-Yu, Yiming Yang, Jamie Callan, Graham Neubig
Published: 2023
Privacy implications of retrieval-based language models
Y. Huang, S. Gupta, Z. Zhong, K. Li, D. Chen
Published: 2023
Press: Defending privacy in retrieval-augmented generation via embedding space shifting
J. He, C. Liu, G. Hou, W. Jiang, J. Li
Published: 2025
D-rag: A privacy-preserving framework for decentralized rag using blockchain
T. E Andersen, A. M. Avalos, G. G Dagher, M. Long
Published: 2025
Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval
Pengcheng Zhou, Yinglun Feng, Zhongliang Yang
Published: 2025.3.17
A format-compatible searchable encryption scheme for jpeg images using bag-of-words
Z. Xia, Q. Ji, Q. Gu, C. Yuan, F. Xiao
Published: 2022
Practical dynamic searchable encryption with small leakage
E. Stefanov, C. Papamanthou, E. Shi
Published: 2014
Efficient dynamic searchable encryption with forward privacy
M. Etemad, A. Kupcu, C. Papamanthou, D. Evans
Published: 2018
Dynamic searchable symmetric encryption with strong security and robustness
H. Dou, Z. Dan, P. Xu, W. Wang, S. Xu, T. Chen, H. Jin
Published: 2024
Enabling efficient privacy-preserving spatio-temporal location-based services for smart cities
Z. Li, J. Ma, Y. Miao, X. Wang, J. Li, C. Xu
Published: 2023
Efficient location-based skyline queries with secure r-tree over encrypted data
Z. Wang, X. Ding, J. Lu, L. Zhang, P. Zhou, K.-K. R. Choo, H. Jin
Published: 2023
Soar: Improved indexing for approximate nearest neighbor search
P. Sun, D. Simcha, D. Dopson, R. Guo, S. Kumar
Published: 2023
Bit-level semantics: Scalable rag retrieval with neurosymbolic hyperdimensional computing
H. Lee, S. Jang, J. Gwak, J. Park, Y. Kim
Published: 2025
Triviaqa: A large scale distantly supervised challenge dataset for reading comprehension
Joshi, M., Choi, E., Weld, D.S., Zettlemoyer, L.
Published: 2017
IHOP: Improved statistical query recovery against searchable symmetric encryption through quadratic optimization
S. Oya, F. Kerschbaum
Published: 2022
A highly accurate query-recovery attack against searchable encryption using non-indexed documents
M. Damie, F. Hahn, A. Peter
Published: 2021
The state of the uniform: Attacks on encrypted databases beyond the uniform query distribution
E. M. Kornaropoulos, C. Papamanthou, R. Tamassia
Published: 2021
Generic attacks on secure outsourced databases
G. Kellaris, G. Kollios, K. Nissim, A. O’Neill
Published: 2016
Share