Private retrieval, computing, and learning: Recent progress and future challenges

S Ulukus, S Avestimehr, M Gastpar… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …

Capacity-achieving private information retrieval codes from MDS-coded databases with minimum message size

R Zhou, C Tian, H Sun, T Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider constructing capacity-achieving linear codes with minimum message size for
private information retrieval (PIR) from N non-colluding databases, where each message is …

On the information leakage in private information retrieval systems

T Guo, R Zhou, C Tian - IEEE Transactions on Information …, 2020 - ieeexplore.ieee.org
We consider information leakage to the user in private information retrieval (PIR) systems.
Information leakage can be measured in terms of individual message leakage or total …

Asymmetric leaky private information retrieval

I Samy, M Attia, R Tandon… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …

Private information retrieval without storage overhead: Coding instead of replication

A Vardy, E Yaakobi - IEEE Journal on Selected Areas in …, 2023 - ieeexplore.ieee.org
Private information retrieval (PIR) protocols allow a user to retrieve a data item from a
database without revealing any information about the identity of the item being retrieved …

The capacity of single-server weakly-private information retrieval

HY Lin, S Kumar, E Rosnes, AG i Amat… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
A private information retrieval (PIR) protocol guarantees that a user can privately retrieve
files stored in a database without revealing any information about the identity of the …

The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

Weakly private information retrieval under the maximal leakage metric

R Zhou, T Guo, C Tian - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
In the canonical private information retrieval (PIR) problem, a user retrieves a message from
a set of databases without allowing any individual database to obtain any knowledge …

Improved weakly private information retrieval codes

C Qian, R Zhou, C Tian, T Liu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (W-PIR), where a user wishes to
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …

Optimal rate-distortion-leakage tradeoff for single-server information retrieval

Y Yakimenka, HY Lin, E Rosnes… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Private information retrieval protocols guarantee that a user can privately and losslessly
retrieve a single file from a database stored across multiple servers. In this work, we propose …