2020
DOI: 10.1109/tit.2020.2977073
|View full text |Cite
|
Sign up to set email alerts
|

Capacity-Achieving Private Information Retrieval Codes From MDS-Coded Databases With Minimum Message Size

Abstract: We consider constructing capacity-achieving linear codes with minimum message size for private information retrieval (PIR) from N non-colluding databases, where each message is coded using maximum distance separable (MDS) codes, such that it can be recovered from accessing the contents of any T databases. It is shown that the minimum message size (sometimes also referred to as the sub-packetization factor) is significantly, in fact exponentially, lower than previously believed. More precisely, when K > T / gcd… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
32
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 59 publications
(32 citation statements)
references
References 15 publications
0
32
0
Order By: Relevance
“…• Perfect user privacy and DB privacy [9] ( = 0, δ = 0). By setting = 0, δ = 0 in Theorems 1 and 2, we obtain the SPIR results in [9] where the optimal required shared randomness is given by α * (0, 0) = α 1 (0, 0) = α 2 (0, 0) = 1 N −1 and the optimal download cost is obtained using the bounds in (17) and (20) as D * ( = 0, δ = 0) = D LB ( = 0, δ = 0) = D UB ( = 0, δ = 0) = 1 + 1 N − 1 .…”
Section: Corollarymentioning
confidence: 88%
See 1 more Smart Citation
“…• Perfect user privacy and DB privacy [9] ( = 0, δ = 0). By setting = 0, δ = 0 in Theorems 1 and 2, we obtain the SPIR results in [9] where the optimal required shared randomness is given by α * (0, 0) = α 1 (0, 0) = α 2 (0, 0) = 1 N −1 and the optimal download cost is obtained using the bounds in (17) and (20) as D * ( = 0, δ = 0) = D LB ( = 0, δ = 0) = D UB ( = 0, δ = 0) = 1 + 1 N − 1 .…”
Section: Corollarymentioning
confidence: 88%
“…which proves that δ 1 ( ) must be greater than or equal δ 2 ( ) for any value of ≥ 0. Following that, we can write the multiplicative gap ratio between the upper and lower bounds on D * ( , δ) given in (17) and (20) as follows:…”
Section: Appendix a Proof Of Corollarymentioning
confidence: 99%
“…This is in contrast to the schemes in [2]- [4], [18], where each file is assumed to be subdivided into a number of packets that grows exponentially with the number of files m. It was shown in [18] that an exponential (in m) number of packets per file was necessary for a PIR scheme with optimal download rate, under the assumption that all servers respond to the queries and the responses have the same size. In [19] a scheme was presented that achieves the capacity with only O(n) packets by making a weaker assumption on the size of the responses than in [18].…”
Section: Conjecture 3 ( [12]mentioning
confidence: 99%
“…Here, we have assumed that all the servers respond with equal size responses. However, by loosening this assumption, improvements for finite m are possible, along the same lines as in [19].…”
Section: Definition 7 (Strongly Linear Pir) We Say That a Linear Pirmentioning
confidence: 99%
“…For K = 2, the individual leakage is equal to the total leakage. The minimum download cost for the same value of individual and total leakage levels are the same, which can be easily verified from (28) and (30). Similarly, the minimum amount of common randomness are also equal to each other, i.e., ρ s min = ρ w min , which can be verified from (27) and (29).…”
Section: Theorem 2 If the Amount Of Common Randomness Satisfiesmentioning
confidence: 54%