2020
DOI: 10.1109/tit.2019.2954336
|View full text |Cite
|
Sign up to set email alerts
|

One-Shot PIR: Refinement and Lifting

Abstract: We study a class of private information retrieval (PIR) methods that we call one-shot schemes. The intuition behind one-shot schemes is the following. The user's query is regarded as a dot product of a query vector and the message vector (database) stored at multiple servers.Privacy, in an information theoretic sense, is then achieved by encrypting the query vector using a secure linear code, such as secret sharing.Several PIR schemes in the literature, in addition to novel ones constructed here, fall into thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 29 publications
(12 citation statements)
references
References 23 publications
0
12
0
Order By: Relevance
“…If all φ b (x k ) are independent for all b, k, and furthermore H(φ b (x k )) = H(ρ (s) n (y n )) for all b, k, n, s, then the two expressions in (6) and (7) for the rate coincide. This is indeed the case given reasonable independence conditions on the data vectors and the functions to be evaluated, but for the sake of compactness and readability we will ignore these subtleties and use (6) as our definition of rate.…”
Section: E Private Computation Of Coded Datamentioning
confidence: 99%
“…If all φ b (x k ) are independent for all b, k, and furthermore H(φ b (x k )) = H(ρ (s) n (y n )) for all b, k, n, s, then the two expressions in (6) and (7) for the rate coincide. This is indeed the case given reasonable independence conditions on the data vectors and the functions to be evaluated, but for the sake of compactness and readability we will ignore these subtleties and use (6) as our definition of rate.…”
Section: E Private Computation Of Coded Datamentioning
confidence: 99%
“…Section IX-A considers the case of two servers and compares the achievable 4tuples R, U, ∆, ρ (•) for the (M, 2) WPIR schemes proposed in Sections IV-A, IV-C, V-A, and V-B. Section IX-B presents optimized values for the download rate for the time-sharing Scheme 1 by numerically solving the convex optimization problem in (18) for both the MI and MaxL privacy metrics and comparisons with the converse bounds from Theorems 7 and 9.…”
Section: Numerical Resultsmentioning
confidence: 99%
“…Thus, the optimization problem (18) under MI leakage is convex. However, it is difficult to have closed-form optimal solutions for (M, n) = (2, 2), and hence instead we present numerical results of the optimized time-sharing (M, 2) Scheme 1 for several values of the number of files M in Section IX.…”
Section: A Optimizing the MI Leakagementioning
confidence: 99%
See 1 more Smart Citation
“…Following [2], the capacity (or its reciprocal, the normalized download cost) of many variations of the problem have been investigated, see, e.g., [3]- [17].…”
Section: Introductionmentioning
confidence: 99%