2021
DOI: 10.1109/jsait.2021.3053481
|View full text |Cite
|
Sign up to set email alerts
|

Double Blind T-Private Information Retrieval

Abstract: Double blind T -private information retrieval (DB-TPIR) enables two users, each of whom specifies an index (θ 1 , θ 2 , resp.), to efficiently retrieve a message W (θ 1 , θ 2 ) labeled by the two indices, from a set of N servers that store all messagesthat the two users' indices are kept private from any set of up to T 1 , T 2 colluding servers, respectively, as well as from each other. A DB-TPIR scheme based on cross-subspace alignment is proposed in this paper, and shown to be capacity-achieving in the asymp… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
18
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(19 citation statements)
references
References 64 publications
1
18
0
Order By: Relevance
“…As a result, this general scheme achieves a retrieval rate of 1 − K+X+T1+...+TM +2B−1 N −U with secrecy rate K+X+T1+...+TM −1 N −(K+X+T1+...+TM +2B+U−1) for any number of files, which generalizes the current optimal schemes as special cases of U-B-MDS-MB-XTSPIR including SPIR [30], MDS-SPIR [42], TSPIR [45], MDS-TSPIR [44], and MB-XTSPIR [24]. Further, when server privacy is not considered, the U-B-MDS-MB-XTSPIR scheme automatically yields the asymptotically optimal schemes for various special PIR cases as the number of files approaches infinity, for examples, U-B-MDS-TPIR [37], obtained by setting M = 1, X = 0, and U-B-MDS-XTPIR [19], obtained by setting M = 1.…”
Section: Introductionmentioning
confidence: 61%
See 4 more Smart Citations
“…As a result, this general scheme achieves a retrieval rate of 1 − K+X+T1+...+TM +2B−1 N −U with secrecy rate K+X+T1+...+TM −1 N −(K+X+T1+...+TM +2B+U−1) for any number of files, which generalizes the current optimal schemes as special cases of U-B-MDS-MB-XTSPIR including SPIR [30], MDS-SPIR [42], TSPIR [45], MDS-TSPIR [44], and MB-XTSPIR [24]. Further, when server privacy is not considered, the U-B-MDS-MB-XTSPIR scheme automatically yields the asymptotically optimal schemes for various special PIR cases as the number of files approaches infinity, for examples, U-B-MDS-TPIR [37], obtained by setting M = 1, X = 0, and U-B-MDS-XTPIR [19], obtained by setting M = 1.…”
Section: Introductionmentioning
confidence: 61%
“…The work that is most related to ours is [24] by Jafar et al, which introduces the problem of Multi-user Blind X-secure T -colluding Symmetric PIR, also referred to as MB-XTSPIR. Specifically, each file, labeled by M indices, is stored in an X-secure fashion at N servers, such that any group of up to X colluding servers learn nothing about the files.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations