Symmetric private information retrieval at the private information retrieval rate

Z Wang, S Ulukus - IEEE Journal on Selected Areas in …, 2022 - ieeexplore.ieee.org
We consider the problem of symmetric private information retrieval (SPIR) with user-side
common randomness. In SPIR, a user retrieves a message out of messages from non …

Digital blind box: Random symmetric private information retrieval

Z Wang, S Ulukus - 2022 IEEE information theory workshop …, 2022 - ieeexplore.ieee.org
We introduce the problem of random symmetric private information retrieval (RSPIR). In
canonical PIR, a user downloads a message out of K messages from N non-colluding and …

The capacity of single-server weakly-private information retrieval

HY Lin, S Kumar, E Rosnes, AG i Amat… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
A private information retrieval (PIR) protocol guarantees that a user can privately retrieve
files stored in a database without revealing any information about the identity of the …

A capacity result on weakly-private information retrieval

S Chen, H Jia, Z Jia - 2024 IEEE International Symposium on …, 2024 - ieeexplore.ieee.org
The problem of weakly-private information retrieval (WPIR) is to allow the user to retrieve
one out of K messages from a set of N distributed servers while guaranteeing that the …

Double Blind T-Private Information Retrieval

Y Lu, Z Jia, SA Jafar - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
Double blind T-private information retrieval (DB-TPIR) enables two users, each of whom
specifies an index (θ 1, θ 2, resp.), to efficiently retrieve a message W (θ 1, θ 2) labeled by …

Weakly private information retrieval from heterogeneously trusted servers

YS Huang, W Zhao, R Zhou… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (PIR) when there is
heterogeneity in servers' trustfulness under the maximal leakage (Max-L) metric. A user …

Improved weakly private information retrieval codes

C Qian, R Zhou, C Tian, T Liu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (W-PIR), where a user wishes to
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …

Optimal rate-distortion-leakage tradeoff for single-server information retrieval

Y Yakimenka, HY Lin, E Rosnes… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Private information retrieval protocols guarantee that a user can privately and losslessly
retrieve a single file from a database stored across multiple servers. In this work, we propose …

Efficient Encrypted Trajectory Similarity Query Over Mobile E-Health Cloud

X Wang, Y Miao, S Zhang, Q Li, J Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Mobile electronic health systems collect a large amount of people's trajectory data through
smart devices (eg, sensors). Generally, to provide data confidentiality, trajectories are …

Bounds on the capacity of private information retrieval over graphs

B Sadeh, Y Gu, I Tamo - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In the private information retrieval (PIR) problem, a user wants to retrieve a file from a
database without revealing any information about the desired file's identity to the servers that …