2021
DOI: 10.48550/arxiv.2108.00026
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Private Retrieval, Computing and Learning: Recent Progress and Future Challenges

Abstract: Most of our lives are conducted in the cyberspace. The human notion of privacy translates into a cyber notion of privacy on many functions that take place in the cyberspace. This article focuses on three such functions: how to privately retrieve information from cyberspace (privacy in information retrieval), how to privately leverage large-scale distributed/parallel processing (privacy in distributed computing), and how to learn/train machine learning models from private data spread across multiple users (priv… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 144 publications
(231 reference statements)
0
4
0
Order By: Relevance
“…In the information theoretic framework, which requires perfect privacy and assumes long messages, the capacity of PIR is the maximum number of bits of desired information that can be retrieved per bit of download from the server(s) [3]. Capacity characterizations have recently been obtained for various forms of PIR, especially for the multi-server setting [3]- [22].…”
Section: Introductionmentioning
confidence: 99%
“…In the information theoretic framework, which requires perfect privacy and assumes long messages, the capacity of PIR is the maximum number of bits of desired information that can be retrieved per bit of download from the server(s) [3]. Capacity characterizations have recently been obtained for various forms of PIR, especially for the multi-server setting [3]- [22].…”
Section: Introductionmentioning
confidence: 99%
“…Information-theoretic privacy and straggler mitigation in coded computing (for polynomial evaluation, matrix-matrix and matrix-vector multiplication) is achieved by using secret sharing [26]- [39]. For a very recent survey on private distributed computing and its connections we refer the reader to [40]. Security against malicious workers is considered in [28], [41]- [44].…”
Section: Introductionmentioning
confidence: 99%
“…For arbitrary collection of security input sets and colluding user sets, I characterize the optimal randomness assumption, i.e., the minimum number of key bits that need to be held by the users, per input bit, for weakly secure summation to be feasible, which generally involves solving a linear program. In a seminal work [78], Shannon introduced the notion of information theoretic security [16,94] based on statistical independence and established the fundamental limits of a single-user secure communication system. While [78] provided an elegant theoretical foundation for cryptography, the optimal solutions are deemed too inefficient to im plement in practice [47].…”
Section: Overview Of the Dissertationmentioning
confidence: 99%
“…≥ max H(Z 4 ), H(Z 5 ), H(Z 3 ) + a * L (6. 94) where in (6.93), we split the non-redundant Z k term in set S m ∪ T n to that in T n \ S and A m,n ; in (6.94), we use Lemma 6.66 to bound the A m,n term conditioned on T n \ S (note that we consider only A m,n where |A m,n | = a * , i.e., A m,n = S). Next, we proceed to bound the term max (H(Z 4 ), H(Z 5 ), H(Z 3 )), where it turns out that the only constraints required are from Lemma 6.44.…”
Section: H(zmentioning
confidence: 99%