2015 IEEE International Symposium on Information Theory (ISIT) 2015
DOI: 10.1109/isit.2015.7282977
|View full text |Cite
|
Sign up to set email alerts
|

Codes for distributed PIR with low storage overhead

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
118
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 133 publications
(119 citation statements)
references
References 13 publications
1
118
0
Order By: Relevance
“…If the k requests are the same (linear combination) then the scheme will be called a functional k-PIR code and furthermore if these k requests contain the same information symbol, then the scheme will be called a k-PIR code. This definition for k-PIR coincides with the definition for k-PIR given in [15], [16] for a single user. Let F B(s, k) (B(s, k), F P (s, k), P (s, k), respectively) be the minimum number of servers required for s items and k requests for functional k-batch (kbatch, functional k-PIR, k-PIR, respectively).…”
Section: B General Description Of the Problemsupporting
confidence: 65%
See 1 more Smart Citation
“…If the k requests are the same (linear combination) then the scheme will be called a functional k-PIR code and furthermore if these k requests contain the same information symbol, then the scheme will be called a k-PIR code. This definition for k-PIR coincides with the definition for k-PIR given in [15], [16] for a single user. Let F B(s, k) (B(s, k), F P (s, k), P (s, k), respectively) be the minimum number of servers required for s items and k requests for functional k-batch (kbatch, functional k-PIR, k-PIR, respectively).…”
Section: B General Description Of the Problemsupporting
confidence: 65%
“…Our goal in this paper is to obtain lower and upper bounds on F B(s, k) and F P (s, k), since relatively good bounds on B(s, k) and P (s, k) are known from the literature. Some of these bounds on B(s, k) and P (s, k) were derived in [1], [5], [15], [20], [23], [25], [30], [34] and are summarized as follows.…”
Section: Basic Resultsmentioning
confidence: 99%
“…We then check the following. 1) Information leakage: in view of the performance of TSC code in (19) and (22), the overall normalized total leakage is…”
Section: B Achievability Of Pareto Optimal Pointsmentioning
confidence: 99%
“…In the classical setting, a user is interested in retrieving a single message (file) out of K messages from N replicated and non-colluding databases, in such a way that no database can know the identity of the user's desired file. The PIR problem has become a vibrant research topic within information theory starting with trailblazing papers [2][3][4][5][6][7][8]. In [9], Sun and Jafar introduce the PIR capacity, which is the supremum of the ratio of the number of bits of desired information (L) that can be retrieved privately to the total downloaded information.…”
Section: Introductionmentioning
confidence: 99%