Private information retrieval without storage overhead: Coding instead of replication

A Vardy, E Yaakobi - IEEE Journal on Selected Areas in …, 2023 - ieeexplore.ieee.org
Private information retrieval (PIR) protocols allow a user to retrieve a data item from a
database without revealing any information about the identity of the item being retrieved …

The capacity of private information retrieval under arbitrary collusion patterns for replicated databases

X Yao, N Liu, W Kang - IEEE Transactions on Information …, 2021 - ieeexplore.ieee.org
We study the private information retrieval (PIR) problem under arbitrary collusion patterns for
replicated databases. We find a general characterization of the PIR capacity, which is the …

A general private information retrieval scheme for MDS coded databases with colluding servers

Y Zhang, G Ge - Designs, Codes and Cryptography, 2019 - Springer
The problem of private information retrieval (PIR) gets renewed attentions in recent years
due to its information-theoretic reformulation and applications in distributed storage systems …

Nearly optimal constructions of PIR and batch codes

H Asi, E Yaakobi - IEEE Transactions on Information Theory, 2018 - ieeexplore.ieee.org
In this paper, we study two families of codes with availability, namely, private information
retrieval (FIR) codes and batch codes. While the former requires that every information …

-private information retrieval schemes using transitive codes

R Freij-Hollanti, OW Gnilke, C Hollanti… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Private information retrieval (PIR) schemes for coded storage with colluding servers are
presented, which are not restricted to maximum distance separable (MDS) codes. PIR …

Breaking the MDS-PIR capacity barrier via joint storage coding

H Sun, C Tian - Information, 2019 - mdpi.com
The capacity of private information retrieval (PIR) from databases coded using maximum
distance separable (MDS) codes was previously characterized by Banawan and Ulukus …

The capacity of symmetric private information retrieval under arbitrary collusion and eavesdropping patterns

J Cheng, N Liu, W Kang, Y Li - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
We study the symmetric private information retrieval (SPIR) problem under arbitrary
collusion and eavesdropping patterns for replicated databases. We find its capacity, which is …

A Shannon-theoretic approach to the storage-retrieval tradeoff in PIR systems

C Tian, H Sun, J Chen - 2018 IEEE International Symposium on …, 2018 - ieeexplore.ieee.org
We consider the storage-retrieval rate tradeoff in private information retrieval systems using
a Shannon-theoretic approach. Our focus is on the canonical two-message two-database …

PIR schemes with small download complexity and low storage requirements

SR Blackburn, T Etzion… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
In the classical model for (information theoretically secure) Private Information Retrieval
(PIR) due to Chor, Goldreich, Kushilevitz and Sudan, a user wishes to retrieve one bit of a …

Locality and availability of array codes constructed from subspaces

N Silberstein, T Etzion… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
We study array codes which are based on subspaces of a linear space over a finite field,
using spreads, q-Steiner systems, and subspace transversal designs. We present several …