2017
DOI: 10.48550/arxiv.1709.01056
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Fundamental Limits of Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

1
51
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 15 publications
(52 citation statements)
references
References 25 publications
1
51
0
Order By: Relevance
“…A caching scheme based on Maximum Distance Separable (MDS) code was proposed. In [27]- [29], for the single-user PIR problem with end-user-cache, instead of caching the whole files, the user can choose any bits to store as in the coded caching model. Novel converse and achievable bounds were proposed in [27]- [29] for the cases where the user's cache is known, partially known, and unknown to the servers, respectively.…”
Section: Relation To Private Information Retrievalmentioning
confidence: 99%
See 1 more Smart Citation
“…A caching scheme based on Maximum Distance Separable (MDS) code was proposed. In [27]- [29], for the single-user PIR problem with end-user-cache, instead of caching the whole files, the user can choose any bits to store as in the coded caching model. Novel converse and achievable bounds were proposed in [27]- [29] for the cases where the user's cache is known, partially known, and unknown to the servers, respectively.…”
Section: Relation To Private Information Retrievalmentioning
confidence: 99%
“…In [27]- [29], for the single-user PIR problem with end-user-cache, instead of caching the whole files, the user can choose any bits to store as in the coded caching model. Novel converse and achievable bounds were proposed in [27]- [29] for the cases where the user's cache is known, partially known, and unknown to the servers, respectively. The authors in [30] considered the single-user PIR problem with end-database-caches, where each server can choose any bits to store instead of being able to access to the whole library.…”
Section: Relation To Private Information Retrievalmentioning
confidence: 99%
“…side information [8], [14], [26], [29], [30]. It is expected that more variant models of PIR will arise according to different practical scenarios.…”
mentioning
confidence: 99%
“…The result is somewhat pessimistic since the user cannot further reduce the download cost by using the cache content. This has motivated subsequent works which have considered the case where the databases are completely unaware or partially unaware of the cache content [30][31][32][33]36,39]. Within this sub-branch of literature, references [30,32,33] have considered PIR with PSI.…”
Section: Related Workmentioning
confidence: 99%
“…. , M. The caching scheme is subject to a memory size constraint, i.e., M i=1 r i = S. Note that in [31,36,39], for each message, the user randomly chooses Lr symbols out of the total L symbols to cache. In [31,36,39], to reliably reconstruct the desired message, the user should record the indices of the cached symbols within each message.…”
Section: Related Workmentioning
confidence: 99%