2018
DOI: 10.1109/tit.2018.2828310
|View full text |Cite
|
Sign up to set email alerts
|

Multi-Message Private Information Retrieval: Capacity Results and Near-Optimal Schemes

Abstract: We consider the problem of multi-message private information retrieval (MPIR) from N non-communicating replicated databases. In MPIR, the user is interested in retrieving P messages out of M stored messages without leaking the identity of the retrieved messages. The information-theoretic sum capacity of MPIR C P s is the maximum number of desired message symbols that can be retrieved privately per downloaded symbol. For the case P ≥ M 2 , we determine the exact sum capacity of MPIR as C P s =

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
148
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 152 publications
(148 citation statements)
references
References 35 publications
0
148
0
Order By: Relevance
“…This proof is similar to the proof in [7] changed to match the current problem setting. To show the limits of capacity, this proof needs to be split in two parts, achievability and converse.…”
Section: A Proof Of Theoremmentioning
confidence: 61%
See 3 more Smart Citations
“…This proof is similar to the proof in [7] changed to match the current problem setting. To show the limits of capacity, this proof needs to be split in two parts, achievability and converse.…”
Section: A Proof Of Theoremmentioning
confidence: 61%
“…Now, as mentioned in [7], H(Â 1 |X (L) P 1 , X (L) P 2 ,Q) (in the modified problem) is quite similar to the H(Â 1 |Q) in an equivalent problem where the user wants to retrieve a subset of inner products indexed by P ⊆ T 2 and T 2 = T 1 \ (P 1 ∪ P 2 ) and thus |T 2 | = T 1 − 2P . The difference between the modified problem and its equivalent problem is that in the modified problem we have conditions on X (L) P 1 , X (L) P 2 , while in the equivalent problem the conditions don't exist.…”
Section: Conversementioning
confidence: 90%
See 2 more Smart Citations
“…However, this implies that X W ′ cannot be the demand, and this will violate the privacy. 6 Now, since E ⊥ is an LRC with block-length n = K, dimension k = K − T , and locality r = M from Theorem 1, we have from (7) that…”
Section: A Single-message Pir-si Schemes and Lrcsmentioning
confidence: 99%