Capacity-achieving private information retrieval codes from MDS-coded databases with minimum message size

R Zhou, C Tian, H Sun, T Liu - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider constructing capacity-achieving linear codes with minimum message size for
private information retrieval (PIR) from N non-colluding databases, where each message is …

Fundamental limits of caching for demand privacy against colluding users

Q Yan, D Tuninetti - IEEE Journal on Selected Areas in …, 2021 - ieeexplore.ieee.org
This article investigates the problem of demand privacy against colluding users for shared-
link coded caching systems, where no subset of users can learn any information about the …

Private and secure distributed matrix multiplication schemes for replicated or MDS-coded servers

J Li, C Hollanti - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
In this paper, we study the problem of private and secure distributed matrix multiplication
(PSDMM), where a user having a private matrix and non-colluding servers sharing a library …

Toward the capacity of private information retrieval from coded and colluding servers

L Holzbaur, R Freij-Hollanti, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this work, two practical concepts related to private information retrieval (PIR) are
introduced and coined full support-rank PIR and strongly linear PIR. Being of full support …

Multi-server weakly-private information retrieval

HY Lin, S Kumar, E Rosnes, AG i Amat… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Private information retrieval (PIR) protocols ensure that a user can download a file from a
database without revealing any information on the identity of the requested file to the servers …

A systematic approach towards efficient private matrix multiplication

J Zhu, S Li - IEEE Journal on Selected Areas in Information …, 2022 - ieeexplore.ieee.org
We consider the problems of Private and Secure Matrix Multiplication (PSMM) and Fully
Private Matrix Multiplication (FPMM), for which matrices privately selected by a master node …

The capacity of private information retrieval under arbitrary collusion patterns for replicated databases

X Yao, N Liu, W Kang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …

The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

Symmetric private polynomial computation from lagrange encoding

J Zhu, Q Yan, X Tang, S Li - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
The problem of-secure-colluding symmetric Private Polynomial Computation (PPC) from
coded storage system with Byzantine and unresponsive servers is studied in this paper …

Improved weakly private information retrieval codes

C Qian, R Zhou, C Tian, T Liu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We study the problem of weakly private information retrieval (W-PIR), where a user wishes to
retrieve a desired message from N non-colluding servers in a way that the privacy leakage …