2019 IEEE International Symposium on Information Theory (ISIT) 2019
DOI: 10.1109/isit.2019.8849275
|View full text |Cite
|
Sign up to set email alerts
|

The Capacity of Multi-round Private Information Retrieval from Byzantine Databases

Abstract: In this work, we investigate the capacity of private information retrieval (PIR) from N replicated databases, where a subset of the databases are untrustworthy (byzantine) in their answers to the query of the user. We allow for multi-round queries and demonstrate that the identities of the byzantine databases can be determined with a small additional download cost. As a result, the capacity of the multi-round PIR with byzantine databases (BPIR) reaches that of the robust PIR problem when the number of byzantin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…However, following the capacity characterization of PIR in [9], [10] under the assumption of long messages (where downloads dominate the communication cost), the fundamental limits (capacity) of various forms of download-efficient PIR have become an active topic in information theory. Recent advances include the capacity characterizations of PIR with T -privacy [11], symmetric-privacy [12], weak privacy [13], [14], eavesdroppers and/or Byzantine servers [15]- [19], coded storage [20]- [27], secure storage [28]- [30], limited storage [31]- [35], cached data or side information [36]- [39], multiple rounds [40], [41], multiple desired messages [42]- [45],…”
Section: Introductionmentioning
confidence: 99%
“…However, following the capacity characterization of PIR in [9], [10] under the assumption of long messages (where downloads dominate the communication cost), the fundamental limits (capacity) of various forms of download-efficient PIR have become an active topic in information theory. Recent advances include the capacity characterizations of PIR with T -privacy [11], symmetric-privacy [12], weak privacy [13], [14], eavesdroppers and/or Byzantine servers [15]- [19], coded storage [20]- [27], secure storage [28]- [30], limited storage [31]- [35], cached data or side information [36]- [39], multiple rounds [40], [41], multiple desired messages [42]- [45],…”
Section: Introductionmentioning
confidence: 99%
“…However, the capacity for the natural setting of secure storage remains unknown, and relatively unexplored. While a number of efforts are motivated by security concerns, such efforts have focused largely on other models, e.g., wiretap models where data security is desired against eavesdroppers listening to the communication between the user and the servers [21,22], Byzantine models where the servers may respond incorrectly by introducing erasures or errors in their response to the user's queries [23][24][25][26][27], and so called symmetric security models [28][29][30] that allow the user to learn nothing about the data besides his desired message. An exception in this regard is the recent work in [31] where PIR with distributed storage is explored and the asymptotic (large K) capacity for the X = T = 1 setting is bounded as…”
Section: Introductionmentioning
confidence: 99%
“…We show the first inequality in (15) by presenting a converse proof for Theorem 1 in Section IV, which is based on similar arguments to those used in cache-aided PIR settings [20]. The second inequality in (15) is shown by a novel achievability scheme for Theorem 1 in Section V, which is based on distributed source coding [28].…”
Section: Main Results We Present Our Main Results In the Following Th...mentioning
confidence: 97%