In the private information retrieval (PIR) problem a user wishes to retrieve, as efficiently as possible, one out of K messages from N non-communicating databases (each holds all K messages) while revealing nothing about the identity of the desired message index to any individual database. The information theoretic capacity of PIR is the maximum number of bits of desired information that can be privately retrieved per bit of downloaded information. For K messages and N databases, we show that the PIR capacity is 1 + 1/N + 1/N 2 + · · · + 1/N K−1 −1 . A remarkable feature of the capacity achieving scheme is that if we eliminate any subset of messages (by setting the message symbols to zero), the resulting scheme also achieves the PIR capacity for the remaining subset of messages.
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out of K messages from N non-communicating replicated databases (each holds all K messages) while keeping the identity of the desired message index a secret from each individual database. The information theoretic capacity of PIR (equivalently, the reciprocal of minimum download cost) is the maximum number of bits of desired information that can be privately retrieved per bit of downloaded information. T -private PIR is a generalization of PIR to include the requirement that even if any T of the N databases collude, the identity of the retrieved message remains completely unknown to them. Robust PIR is another generalization that refers to the scenario where we have M ≥ N databases, out of which any M − N may fail to respond. For K messages and M ≥ N databases out of which at least some N must respond, we show that the capacity of T -private and Robust PIR is 1 + T /N + T 2 /N 2 + · · · + T K−1 /N K−1 −1 . The result includes as special cases the capacity of PIR without robustness (M = N ) or T -privacy constraints (T = 1).
Pairwise particle interactions arise in diverse physical systems ranging from insect swarms to self-assembly of nanoparticles. In the presence of long-range attraction and short-range repulsion, such systems can exhibit bound states. We use linear stability analysis of a ring equilibrium to classify the morphology of patterns in two dimensions. Conditions are identified that assure the well-posedness of the ring. In addition, weakly nonlinear theory and numerical simulations demonstrate how a ring can bifurcate to more complex equilibria including triangular shapes, annuli, and spot patterns with N-fold symmetry. Many of these patterns have been observed in nature, although a general theory has been lacking, in particular how small changes to the interaction potential can lead to large changes in the self-organized state.
Private information retrieval (PIR) is the problem of retrieving as efficiently as possible, one out of K messages from N non-communicating replicated databases (each holds all K messages) while keeping the identity of the desired message index a secret from each individual database. Symmetric PIR (SPIR) is a generalization of PIR to include the requirement that beyond the desired message, the user learns nothing about the other K − 1 messages. The information theoretic capacity of SPIR (equivalently, the reciprocal of minimum download cost) is the maximum number of bits of desired information that can be privately retrieved per bit of downloaded information. We show that the capacity of SPIR is 1 − 1/N regardless of the number of messages K, if the databases have access to common randomness (not available to the user) that is independent of the messages, in the amount that is at least 1/(N − 1) bits per desired message bit, and zero otherwise. Extensions to the capacity region of SPIR and the capacity of finite length SPIR are provided.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.