Multi-server weakly-private information retrieval

HY Lin, S Kumar, E Rosnes, AG i Amat… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Private information retrieval (PIR) protocols ensure that a user can download a file from a
database without revealing any information on the identity of the requested file to the servers …

The capacity of private information retrieval under arbitrary collusion patterns for replicated databases

X Yao, N Liu, W Kang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …

Private information retrieval for a multi-message scenario with private side information

MJ Siavoshani, SP Shariatpanahi… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
We consider the problem of private information retrieval (PIR), where a single user with
private side information (PSI) aims to retrieve multiple files from a library stored at some …

The capacity of single-server weakly-private information retrieval

HY Lin, S Kumar, E Rosnes, AG i Amat… - IEEE Journal on …, 2021 - ieeexplore.ieee.org
A private information retrieval (PIR) protocol guarantees that a user can privately retrieve
files stored in a database without revealing any information about the identity of the …

Capacity of private linear computation for coded databases

SA Obead, HY Lin, E Rosnes… - 2018 56th Annual …, 2018 - ieeexplore.ieee.org
We consider the problem of private linear computation (PLC) in a distributed storage system.
In PLC, a user wishes to compute a linear combination of f messages stored in noncolluding …

The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

Private linear computation for noncolluding coded databases

SA Obead, HY Lin, E Rosnes… - IEEE Journal on Selected …, 2022 - ieeexplore.ieee.org
Private computation in a distributed storage system (DSS) is a generalization of the private
information retrieval (PIR) problem. In such a setting, a user wishes to compute a function of …

The capacity of multi-round private information retrieval from byzantine databases

X Yao, N Liu, W Kang - 2019 IEEE International Symposium on …, 2019 - ieeexplore.ieee.org
In this work, we investigate the capacity of private information retrieval (PIR) from N
replicated databases, where a subset of the databases are byzantine. We allow for multi …

The capacity of private information retrieval under arbitrary collusion patterns

X Yao, N Liu, W Kang - 2020 IEEE International Symposium on …, 2020 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find its capacity, which is the same as the capacity of the original …

Two-level private information retrieval

R Zhou, C Tian, H Sun, JS Plank - IEEE Journal on Selected …, 2022 - ieeexplore.ieee.org
In the conventional robust-colluding private information retrieval (PIR) system, the user
needs to retrieve one of the possible messages while keeping the identity of the requested …