2019
DOI: 10.1109/tit.2018.2883302
|View full text |Cite
|
Sign up to set email alerts
|

Fundamental Limits of Cache-Aided Private Information Retrieval With Unknown and Uncoded Prefetching

Abstract: We consider the problem of private information retrieval (PIR) from N non-colluding and replicated databases when the user is equipped with a cache that holds an uncoded fraction r from each of the K stored messages in the databases. We assume that the databases are unaware of the cache content. We investigate D * (r) the optimal download cost normalized with the message size as a function of K, N , r. For a fixed K, N , we develop an inner bound (converse bound) for the D * (r) curve. The inner bound is a pie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
78
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 104 publications
(79 citation statements)
references
References 52 publications
1
78
0
Order By: Relevance
“…In particular, capacity is known for disjoint colluding sets [4]. The rapidly growing body of literature in this area has produced capacity results for PIR under a rich variety of constraints [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. However, the capacity for the natural setting of secure storage remains unknown, and relatively unexplored.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, capacity is known for disjoint colluding sets [4]. The rapidly growing body of literature in this area has produced capacity results for PIR under a rich variety of constraints [5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20]. However, the capacity for the natural setting of secure storage remains unknown, and relatively unexplored.…”
Section: Introductionmentioning
confidence: 99%
“…Hence, Eqn. (16) guarantees that the total number of side information messages used by any N coding subspaces is not larger than M . Additionally, if the size of one coding subspace is equal to or less than N , the number of side information messages that can be used in such coding subspace can only be zero.…”
Section: Resultsmentioning
confidence: 99%
“…, m |L| } is the vector of the number of side information messages used in each coding subspace which satisfies Eqn. (16) and…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, in order to formulate a meaningful PIR problem, we allow the user (retriever) access the data center as well as the databases in the retrieval phase. Finally, we remark about another sub-branch of PIR literature that considers caching: [30][31][32][33]39,52]; there the user (retriever) itself has a cache memory where it stores a subset of the bits available in the databases. That problem is unrelated to the setting here even though it is also referred to as PIR with caching; in essence, it is PIR with side information.…”
Section: Introductionmentioning
confidence: 99%