2019
DOI: 10.1109/tit.2018.2869154
|View full text |Cite
|
Sign up to set email alerts
|

The Capacity of Private Information Retrieval from Byzantine and Colluding Databases

Abstract: We consider the problem of single-round private information retrieval (PIR) from N replicated databases. We consider the case when B databases are outdated (unsynchronized), or even worse, adversarial (Byzantine), and therefore, can return incorrect answers. In the PIR problem with Byzantine databases (BPIR), a user wishes to retrieve a specific message from a set of M messages with zero-error, irrespective of the actions performed by the Byzantine databases. We consider the T -privacy constraint in this paper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
110
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 169 publications
(113 citation statements)
references
References 48 publications
(155 reference statements)
2
110
0
1
Order By: Relevance
“…Several CPIR capacities have been derived (see Table I), e.g., the capacity when some servers may collude [13] and the capacity when the file set is coded and distributed to the servers [14]. Moreover, many other papers [15]- [22] have studied the CPIR capacity and the capacity-achieving protocols.…”
Section: Introductionmentioning
confidence: 99%
“…Several CPIR capacities have been derived (see Table I), e.g., the capacity when some servers may collude [13] and the capacity when the file set is coded and distributed to the servers [14]. Moreover, many other papers [15]- [22] have studied the CPIR capacity and the capacity-achieving protocols.…”
Section: Introductionmentioning
confidence: 99%
“…1:N , F), which is the amount of information that the user can obtain about the individual non-desired message-k ′ . The total leakage and the individual leakage in the systems are constrained as follows (12) where the parameters s and w are used to indicate the strong security requirement and the weak security requirement, respectively. For K = 2, since I(Wk; Q…”
Section: A Problem Statementmentioning
confidence: 99%
“…This scheme is an information-theoretic PIR scheme for retrieving data from MDS-coded, colluding, unresponsive, and Byzantine databases. The reason we use this scheme instead of the capacity achieving scheme in [14] is to avoid the exponential file size (in the number of parking offers), which is needed to realize the scheme in [11]. Furthermore, as the number of parking offers become sufficiently large, the retrieval rate of [11] converges to the capacity expression of [14].…”
Section: B Private Information Retrieval (Pir)mentioning
confidence: 99%
“…C [1] C [2] C [3] C [4] C [5] C [6] C [7] C [8] C [9] C [10] C [11] C [12] C [13] C [14] C [15] C [16] C [17] C [18] Figure 2: Nashville city, TN, USA is divided into geographical areas (cells).…”
Section: B Private Information Retrieval (Pir)mentioning
confidence: 99%