2015
DOI: 10.1109/jstsp.2015.2432740
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Private Information Retrieval Over Unsynchronized Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
37
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(38 citation statements)
references
References 25 publications
1
37
0
Order By: Relevance
“…Finally, we denote D as the expected number of downloaded bits with respect to different realization of the cached bit indices, i.e., D = E H [D H ]. A pair (D, L) is achievable if there exists a PIR scheme satisfying the reliability constraint (7) and the privacy constraint (8). The optimal normalized download cost D * is defined as…”
Section: Usermentioning
confidence: 99%
See 1 more Smart Citation
“…Finally, we denote D as the expected number of downloaded bits with respect to different realization of the cached bit indices, i.e., D = E H [D H ]. A pair (D, L) is achievable if there exists a PIR scheme satisfying the reliability constraint (7) and the privacy constraint (8). The optimal normalized download cost D * is defined as…”
Section: Usermentioning
confidence: 99%
“…A simple but highly inefficient way is to download all the files from a particular database, which results in the normalized download cost of D L = K, where L is the file size and D is the total number of downloaded bits from the N databases. The PIR problem has originated in the computer science community [1][2][3][4][5] and has drawn attention in the information theory society with early examples [6][7][8][9][10][11]. Recently, Sun and Jafar [12] have characterized the optimal normalized download cost for the classical PIR problem to be D L = 1 + 1 N + · · · + 1 N K−1 .…”
Section: Introductionmentioning
confidence: 99%
“…To fully characterize the storage system in this case, we represent the storage system as R-regular graph 1 ; see Fig. 1 and Table 1 for a (6,3,2,9) example. We characterize the storage system by a (V, E) regular graph, where V = W = {W 1 , W 2 , · · · , W K } is the set of vertices, and E = D = {D 1 , D 2 , · · · , D N } is the set of edges, i.e., in this graph, the vertices are the messages and the edges are the databases.…”
Section: Problem Formulationmentioning
confidence: 99%
“…In the classical setting, a user is interested in retrieving a single message (file) out of K messages from N replicated and non-colluding databases, in such a way that no database can know the identity of the user's desired file. The PIR problem has become a vibrant research topic within information theory starting with trailblazing papers [2][3][4][5][6][7][8]. In [9], Sun and Jafar introduce the PIR capacity, which is the supremum of the ratio of the number of bits of desired information (L) that can be retrieved privately to the total downloaded information.…”
Section: Introductionmentioning
confidence: 99%
“…The informationtheoretic formulation of the BPIR problem was proposed in [39], where a subset of databases with size B may introduce arbitrary errors to the answers of the user's query. This may be done unintentionally, for example, when some databases' contents are not up to date [40], or intentionally, when some databases introduce errors in their answers to prevent the user from correctly decoding the desired message. While the user knows the number B, it does not know which set of B databases are byzantine.…”
Section: Introductionmentioning
confidence: 99%