2019
DOI: 10.1109/tit.2019.2900313
|View full text |Cite
|
Sign up to set email alerts
|

Achieving Maximum Distance Separable Private Information Retrieval Capacity With Linear Codes

Abstract: We propose three private information retrieval (PIR) protocols for distributed storage systems (DSSs) where data is stored using an arbitrary linear code. The first two protocols, named Protocol 1 and Protocol 2, achieve privacy for the scenario with noncolluding nodes. Protocol 1 requires a file size that is exponential in the number of files in the system, while Protocol 2 requires a file size that is independent of the number of files and is hence simpler. We prove that, for certain linear codes, Protocol 1… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
101
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 104 publications
(103 citation statements)
references
References 47 publications
2
101
0
Order By: Relevance
“…7) Privacy: It is worth mentioning that the queries generated by Algorithm 1 inherently satisfy the privacy condition of (2a), which is guaranteed by satisfying the index, message, and database symmetry principles as for all the PIR schemes in [11], [13], [16]. We also would like to emphasize that the achievable rates of our proposed PC schemes can be further improved by removing the redundant queries caused from the dependency among the virtual messages.…”
Section: Algorithm 1: Q-genmentioning
confidence: 96%
See 4 more Smart Citations
“…7) Privacy: It is worth mentioning that the queries generated by Algorithm 1 inherently satisfy the privacy condition of (2a), which is guaranteed by satisfying the index, message, and database symmetry principles as for all the PIR schemes in [11], [13], [16]. We also would like to emphasize that the achievable rates of our proposed PC schemes can be further improved by removing the redundant queries caused from the dependency among the virtual messages.…”
Section: Algorithm 1: Q-genmentioning
confidence: 96%
“…Now, we are ready for the converse proof. By [16,Lem. 2], since the code C is MDS-PIR capacity-achieving, there exist ν information sets I 1 , .…”
Section: (V)mentioning
confidence: 99%
See 3 more Smart Citations