2018
DOI: 10.48550/arxiv.1811.11160
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

The Capacity of Private Information Retrieval from Decentralized Uncoded Caching Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2019
2019
2020
2020

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 47 publications
0
7
0
Order By: Relevance
“…which follows similar reasoning as (25). From (26), we see that each answer Āk is protected by a randomness Sk , and as long as the eavesdropper sees no more than L F many answers, the corresponding L F number of Ss are linearly independent, due to the MDS property of the generating matrix G ( L, L F ) . Hence, the inner product of the corresponding query vector and message vector is fully protected against the passive eavesdropper who observes answers from servers in E m .…”
Section: The Number Of Query Vectors Each Colluding Setmentioning
confidence: 53%
“…which follows similar reasoning as (25). From (26), we see that each answer Āk is protected by a randomness Sk , and as long as the eavesdropper sees no more than L F many answers, the corresponding L F number of Ss are linearly independent, due to the MDS property of the generating matrix G ( L, L F ) . Hence, the inner product of the corresponding query vector and message vector is fully protected against the passive eavesdropper who observes answers from servers in E m .…”
Section: The Number Of Query Vectors Each Colluding Setmentioning
confidence: 53%
“…Furthermore, the proof techniques therein may be useful to derive the minimum L for a SC-PIR problem. Second, another work [6] has considered random placement among databases where a database stores a bit of a given message with probability µ. Interestingly, this placement method was also used in [11] for the coded caching problem. It will be meaningful to examine alternative random placement strategies for the SC-PIR problem where messages are split into a finite number of sub-messages.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Hence, the proposed PIR scheme of [2] can be impractical for a large number of databases. This achievable scheme was generalized to the decentralized storage placement in [6]. Furthermore, Tian et al [7] use Shannon theoretic approach to analyze the SC-PIR problem for the canonical case of K = 2 and N = 2 and proposed the optimal linear scheme.…”
Section: Introductionmentioning
confidence: 99%
“…, N . This problem is then extended to the decentralized setting in [35], where the contents are stored independently across databases according to a probability distribution, and to the heterogeneous setting in [40] where the databases have heterogeneous storage sizes. In all these works, with the exception of [12], the fundamental limits are derived for uncoded storage strategies.…”
Section: Introductionmentioning
confidence: 99%