Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing 2015
DOI: 10.1145/2746539.2746546
|View full text |Cite
|
Sign up to set email alerts
|

2-Server PIR with Sub-Polynomial Communication

Abstract: A 2-server Private Information Retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit database replicated among two non-communicating servers, while not revealing any information about i to either server. In this work we construct a 2-server PIR scheme with total communication cost n O log log n log n. This improves over current 2-server protocols which all require Ω(n 1/3 ) communication.Our construction circumvents the n 1/3 barrier of Razborov and Yekhanin [21] which holds for the restrict… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
50
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 52 publications
(50 citation statements)
references
References 26 publications
0
50
0
Order By: Relevance
“…Clearly, the choice α φ A vf ,eφ /γ f satisfies (9), and consequently, h Av g ,e φ γgαφ satisfies (8). We are only left to show that this value for h is neither 0 nor 1.…”
Section: Lemma 14mentioning
confidence: 97%
“…Clearly, the choice α φ A vf ,eφ /γ f satisfies (9), and consequently, h Av g ,e φ γgαφ satisfies (8). We are only left to show that this value for h is neither 0 nor 1.…”
Section: Lemma 14mentioning
confidence: 97%
“…Suppose that C = RM (0, 4) = Rep(16) 2 , so that data is stored via a replication system over n = 16 servers. Set D = RM (1,4), which is a [16,5,8]…”
Section: B Achievable Pir Rate With Reed-muller Codesmentioning
confidence: 99%
“…As discussed above, the word size can not be pushed beyond 2 Θ( √ log n) due to known constructions [DG15].…”
Section: Open Problems We Compile a List Of Exciting Open Problemsmentioning
confidence: 99%