Private retrieval, computing, and learning: Recent progress and future challenges

S Ulukus, S Avestimehr, M Gastpar… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Most of our lives are conducted in the cyberspace. The human notion of privacy translates
into a cyber notion of privacy on many functions that take place in the cyberspace. This …

Asymmetric leaky private information retrieval

I Samy, M Attia, R Tandon… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Information-theoretic formulations of the private information retrieval (PIR) problem have
been investigated under a variety of scenarios. Symmetric private information retrieval …

Multi-server weakly-private information retrieval

HY Lin, S Kumar, E Rosnes, AG i Amat… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Private information retrieval (PIR) protocols ensure that a user can download a file from a
database without revealing any information on the identity of the requested file to the servers …

The capacity of private information retrieval under arbitrary collusion patterns for replicated databases

X Yao, N Liu, W Kang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …

Improved weakly private information retrieval codes

C Qian, R Zhou, C Tian, T Liu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (W-PIR), where a user wishes to
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …

Optimal rate-distortion-leakage tradeoff for single-server information retrieval

Y Yakimenka, HY Lin, E Rosnes… - IEEE Journal on …, 2022 - ieeexplore.ieee.org
Private information retrieval protocols guarantee that a user can privately and losslessly
retrieve a single file from a database stored across multiple servers. In this work, we propose …

Bounds on the capacity of private information retrieval over graphs

B Sadeh, Y Gu, I Tamo - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
In the private information retrieval (PIR) problem, a user wants to retrieve a file from a
database without revealing any information about the desired file's identity to the servers that …

Multi-message pliable private information retrieval

SA Obead, J Kliewer - 2022 IEEE Information Theory …, 2022 - ieeexplore.ieee.org
We formulate a new variant of the private information retrieval (PIR) problem where the user
is pliable, ie, interested in any message from a desired subset of the available dataset …

P3LI5: Practical and confidEntial Lawful Interception on the 5G core

F Intoci, J Sturm, D Fraunholz… - … IEEE Conference on …, 2023 - ieeexplore.ieee.org
Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to
provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain …

A Capacity Result on Weakly-Private Information Retrieval

S Chen, H Jia, Z Jia - 2024 IEEE International Symposium on …, 2024 - ieeexplore.ieee.org
The problem of weakly-private information retrieval (WPIR) is to allow the user to retrieve
one out of K messages from a set of N distributed servers while guaranteeing that the …