2018 52nd Asilomar Conference on Signals, Systems, and Computers 2018
DOI: 10.1109/acssc.2018.8645154
|View full text |Cite
|
Sign up to set email alerts
|

The Capacity of Private Information Retrieval with Eavesdroppers

Abstract: We consider the problem of private information retrieval (PIR) with colluding servers and eavesdroppers (abbreviated as ETPIR). The ETPIR problem is comprised of K messages, N servers where each server stores all K messages, a user who wants to retrieve one of the K messages without revealing the desired message index to any set of T colluding servers, and an eavesdropper who can listen to the queries and answers of any E servers but is prevented from learning any information about the messages. The informatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 15 publications
0
9
0
Order By: Relevance
“…where (18) follows from the definitions of H n , B , and P W |L . Furthermore, (18) equates to stating that P S|W (P)…”
Section: Proof Of Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…where (18) follows from the definitions of H n , B , and P W |L . Furthermore, (18) equates to stating that P S|W (P)…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…The problem of latent-variable private information retrieval (PIR) was recently introduced in [15], where the goal is to retrieve content while satisfying perfect privacy for latent attributes. This can allow a reduction in the download cost compared to conventional PIR protocols (such as [16]- [18]) which hide the identity of the desired content.…”
Section: Introductionmentioning
confidence: 99%
“…because U (t) = [K] is a constant, where U [t] := {U (j) } t j=0 . It is worthy noting that X (τ (t)) is indeed X (t) since τ (t) = t. 4) Compute P X (t+1) , X (τ (t+1)) |U [t] = u [t] by P X (t+1) , X (τ (t+1)) |U [t] = u [t] = x∈[K] P X (t) = x|U [t] = u [t] P X (t+1) , X (τ (t+1)) |X (t) = x , (20) where τ (t + 1) is either t or t + 1 by definition, i.e., τ (t + 1) = t if t + 1 / ∈ P, and τ (t + 1) = t + 1 otherwise.…”
Section: B Application Of the Intermittent Pir Schemementioning
confidence: 99%
“…Compute P X (t+1) , X (τ (t+1)) |U [t] = u [t] from P X (t) , X (τ (t)) |U [t] = u [t] according to (20) 8: else if t / ∈ P then 9:…”
Section: B Application Of the Intermittent Pir Schemementioning
confidence: 99%
See 1 more Smart Citation