2019
DOI: 10.1109/tit.2019.2916079
|View full text |Cite
|
Sign up to set email alerts
|

Cross Subspace Alignment and the Asymptotic Capacity of $X$ -Secure $T$ -Private Information Retrieval

Abstract: X-secure and T -private information retrieval (XSTPIR) is a form of private information retrieval where data security is guaranteed against collusion among up to X servers and the user's privacy is guaranteed against collusion among up to T servers. The capacity of XSTPIR is characterized for arbitrary number of servers N , and arbitrary security and privacy thresholds X and T , in the limit as the number of messages K → ∞. Capacity is also characterized for any number of messages if either N = 3, X = T = 1 or… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

5
79
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

1
5

Authors

Journals

citations
Cited by 100 publications
(89 citation statements)
references
References 53 publications
5
79
0
Order By: Relevance
“…which is strictly worse than that of [11] when E > 0. This essentially stems from the fact that it is not clear how to align the noise terms arising from the function-privacy randomness and data-privacy randomness as in [11] for non-linear functions. Thus our PC scheme leaves room for improvement in the case of non-trivial data privacy.…”
Section: E Comparison With Previous Workmentioning
confidence: 79%
See 4 more Smart Citations
“…which is strictly worse than that of [11] when E > 0. This essentially stems from the fact that it is not clear how to align the noise terms arising from the function-privacy randomness and data-privacy randomness as in [11] for non-linear functions. Thus our PC scheme leaves room for improvement in the case of non-trivial data privacy.…”
Section: E Comparison With Previous Workmentioning
confidence: 79%
“…Additional interesting and practically relevant variants on PIR appear Parts of this work were presented at the International Symposium on Information Theory (ISIT), Vail, CO, USA, 2018. when one accounts for unreliability of the servers, whether they be unresponsive, malicious, or curious as to the contents of the data they are storing. Variants along these lines have been studied and capacity expressions have been derived in [3,11,24].…”
Section: A Private Information Retrievalmentioning
confidence: 99%
See 3 more Smart Citations