2020
DOI: 10.1109/tit.2020.2964762
|View full text |Cite
|
Sign up to set email alerts
|

The Capacity of Private Information Retrieval From Heterogeneous Uncoded Caching Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 49 publications
(18 citation statements)
references
References 48 publications
1
17
0
Order By: Relevance
“…However, following the capacity characterization of PIR in [9], [10] under the assumption of long messages (where downloads dominate the communication cost), the fundamental limits (capacity) of various forms of download-efficient PIR have become an active topic in information theory. Recent advances include the capacity characterizations of PIR with T -privacy [11], symmetric-privacy [12], weak privacy [13], [14], eavesdroppers and/or Byzantine servers [15]- [19], coded storage [20]- [27], secure storage [28]- [30], limited storage [31]- [35], cached data or side information [36]- [39], multiple rounds [40], [41], multiple desired messages [42]- [45],…”
Section: Introductionmentioning
confidence: 99%
“…However, following the capacity characterization of PIR in [9], [10] under the assumption of long messages (where downloads dominate the communication cost), the fundamental limits (capacity) of various forms of download-efficient PIR have become an active topic in information theory. Recent advances include the capacity characterizations of PIR with T -privacy [11], symmetric-privacy [12], weak privacy [13], [14], eavesdroppers and/or Byzantine servers [15]- [19], coded storage [20]- [27], secure storage [28]- [30], limited storage [31]- [35], cached data or side information [36]- [39], multiple rounds [40], [41], multiple desired messages [42]- [45],…”
Section: Introductionmentioning
confidence: 99%
“…Server storage: Each server has the same storage capability and stores all K messages in the canonical model. The storage system at the servers has been generalized to MDS coded [11,12] or coded by a given linear code [13] for each message, and arbitrarily uncoded [14] with heterogeneous capabilities [15,16]. In these settings the iterative construction from [1] are still largely compatible with the storage structure.…”
Section: Introductionmentioning
confidence: 99%
“…However, following the capacity characterization of PIR in [9], [10] under the assumption of long messages (where downloads dominate the communication cost), the fundamental limits (capacity) of various forms of downloadefficient PIR have become an active topic in information theory. Recent advances include the capacity characterizations of PIR with T -privacy [11], symmetric-privacy [12], weak privacy [13], [14], eavesdroppers and/or Byzantine servers [15]- [19], coded storage [20]- [27], secure storage [28]- [30], limited storage [31]- [35], cached data or side information [36]- [40], multiple rounds [41], [42], multiple desired messages [43]- [46], upload constraints [47], arbitrary collusion patterns [21], [48], as well as applications of PIR to private computation [49]- [52], private search [53], private set intersection [46], coded computing [54], locally decodable codes [55], etc.…”
Section: Introductionmentioning
confidence: 99%